Telegram Group: Answer Key Available at
Telegram Group: Answer Key Available at
Telegram Group: Answer Key Available at
Answer: C
Q8. Q12.
The difference between one megabyte and Memory storage is called volatile, if data
one kilobyte is approximately: stored are lost when power is turned off.
Such a memory is:
A. 1000 kilobyte
B. 1 gigabyte A. ROM
C. 100 kilobyte. B. RAM
D. 1 Million bits C. Both A and B
D. EAPROM
Answer: A
Answer: B
Q9.
"An operating system" in a computer Q13.
indicates: You can connect your computer to the
Internet by connecting it to a:
A. A software which operates the computer
B. A hardware which joins the various A. Telephone line
parts of a computer B. Modem
C. A set of trained operators to work on the C. Telephone line via modem
computers D. None of the above
D. A permission given by the computer
manufacturer to start the computers Answer: C
Answer: A Q14.
Which one of the following memories is
Q10. known as permanent stores?
Microsoft Office is a:
A. RAM
A. Computer software B. ROM
B. Computer hardware C. Cache Memory
C. Headquarters of Microsoft Company D. Character Addressable Memory
D. None of the above
Answer: B
Answer: A
Q15.
Q11. Which one of the following is not a
The arithmetic and logic operations are characteristic of a computer?
performed in:
A. Accuracy
A. Hard disk B. Speed
B. Memory C. Storage
C. CD-ROM D. Rigidity
D. CPU
Answer: D
Answer: D
Q16. Q20.
UNIVAC is: ASCII and EBCDIC are the popular
character coding systems.
A. Universal Automatic Computer What does EBCDIC stand for?
B. Universal Array Computer
C. Unique Automatic Computer A. Extended Binary Coded Decimal
D. Unvalued Automatic Computer Interchange Code
B. Extended Bit Code Decimal Interchange
Answer: A Code
C. Extended Bit Case Decimal Interchange
Q17. Code
A storage area used to store data to D. Extended Binary Case Decimal
compensate for the difference in speed at Interchange Code
which the different units can handle data
is: Answer: A
A. Memory Q21.
B. Buffer A modem is a device which converts:
C. Accumulator
D. Address A. Analog signal to digital signal only
B. Digital signal to analog signal and vice
Answer: B versa
C. Digital signal to analog signal only
Q18. D. None of the above
The ALU of a computer responds to the
commands coming from: Answer: B
A. OCR
B. Optical scanners
C. Voice recognition device
D. None of the above
Answer: D
Q23. Q26.
Retrieval of data from Internet and 'What is "Virtual Private Network"?
communication through e-mail follow
certain rules called: A. It is a private computer network of an
organization where the remote users can
A. Hyperlinks transmit encrypted information through the
B. Hypertext server of the organization.
C. Mail attachments B. It is a computer network across a public
D. Protocols internet that provides users access to their
organization's network while maintaining
Answer: D the security of the information transmitted.
C. It is a computer network in which users
Q24. can access a shared pool of computing
In e-mail communication, you can save resources through a service provider.
frequently used e-mail IDs using: D. None of the statements (a), (b) and (c)
given above is a correct description of
A. History of a web page you visited Virtual Private Network.
B. Favourites
C. Address book Answer: B
D. File save
Q27.
Answer: C Connection or link to other documents or
Web Pages that contain related information
Q25. is called:
Simple Mail Transfer Protocol (SMTP) is
used in: A. Domain name
B. Hyperlink
A. File transfer through internet C. Dial-up
B. Browsing internet D. E-cash
C. Using search engines
D. E-mail communication Answer: B
Answer: D Q28.
The computer needs additional
components called _______ to accomplish
its input, output and storage functions:
A. Mice
B. Specifications
C. Architecture
D. Peripheral
Answer: D
Q29. Q32.
In context of Web Technology, the What characteristic of read-only memory
program ‘SPIDER’ refers to: (ROM) makes it useful?
Answer: C
Q35. Q39.
The system unit of a personal computer RDBMS stands for:
typically contains all of the following
except: A. Repairable Database Management
System
A. Microprocessor B. Relational Database Management
B. Disk controller System
C. Serial interface C. Relational Database Memory System
D. Modem D. Recurring Database Memory System
Answer: D Answer: B
Q36. Q40.
A technique for producing animation in Which one of the following is not among
which one image changes into another is the three logical operators in Java Script?
called:
A. ADD
A. Embedding B. AND
B. Linking C. OR
C. Morphing D. NOT
D. Scanning
Answer: A
Answer: C
Q41.
Q37. Daisy wheel printer is a type of
To read a CD-ROM Disc, you need a:
A. Matrix printer
A. Laser Beam B. Impact printer
B. Magnetic Needle C. Laser printer
C. Sound Card D. Manual printer
D. Graphics Card
Answer: B
Answer: A
Q42.
Q38. A Compact disk is a data storage system of
Both the ALU and Control Section have the type:
special purpose storage locations called:
A. Magnetic
A. Registers B. Optical
B. Accumulators C. Electric
C. Bus D. Electro-Mechanical
D. Address
Answer: B
Answer: A
Q43. Q47.
Who developed the concept of e-mail? _________ is a network topology where
each individual piece of a network is
A. Bill Gates attached to a central node (often called a
B. Arthur C. Clark hub or switch).
C. Ray Tomlinson
D. Sabir Bhatia A. Star topology
B. Bus topology
Answer: C C. Mesh topology
D. Ring topology
Q44.
Which of the following circuit is used as Answer: A
‘Memory Device’ in computers?
Q48.
A. Rectifier USB stands for:
B. Flip-Flop
C. Comparator A. Universal Serial Bus
D. Attenuator B. Universal Sequential Bus
C. Unidentified Serial Bus
Answer: B D. Unique Sequential Bus
Q45. Answer: A
WLL in computer terminology stands for:
Q49.
A. Walking Land Line Which protocol provides e-mail facility
B. Walking Loop Line among different hosts?
C. Wireless Land Line
D. Wireless Local Loop A. FTP
B. SMTP
Answer: D C. TELNET
D. SNMP
Q46.
What is clickjacking? Answer: B
A. A device that sends and receives data at SMTP: Simple Mail Transfer Protocol
every click in a bit second
B. A device which does/counts clicks on Q50.
internet Encryption and Decryption is the
C. A malicious technique of tricking Web responsibility of ___ Layer.
users into revealing confidential
information A. Physical Layer
D. A digital process that is used to display B. Network Layer
an image on mobiles C. Application Layer
D. Datalink Layer
Answer: C
Answer: C
Q51. Q54.
In context of mobile technology, the term In relation to Unique Identification
'jail breaking' implies a process: Authority of India (UIDAI), ‘QSAM’
stands for:
A. of running away from most secured jails
of USA by hard-core criminals A. Quality Service on Aadhaar Mapper
B. that gives users the ability to install B. Query Sending on Aadhaar Mobile
unauthorized software on certain types of C. Query Service on Aadhaar Mapper
phones D. Quality Service on Aadhaar Mapping
C. of breaking security system by hackers
using WiMAX technology Answer: C
D. of hacking authorized software from
computers, laptop and mobiles Q55.
A special software that is used to create a
Answer: B job queue is called:
Q52. A. Driver
Which of the following is application B. Spooler
software? C. Compiler
D. Linkage editor
A. Windows-10
B. Mac OS X Answer: B
C. Control panel
D. Microsoft Excel Q56.
UNIVAC stands for:
Answer: D
A. Unique Analog Computing
Q53. B. Universal Array Computer
Which Open Systems Interconnections C. Unique Automatic Computer
(OSI) layer does IP belong to? D. Universal Automatic Computer
Answer: D
Q58. Q62.
The software designed to perform a Which one of the following is an
specific task: executable file?
Answer: C Answer: A
Q59. Q63.
In OSI model, _________ layer supports Data in multimedia contains:
the electrical or mechanical interface to the
physical medium. A. Text, number, picture, animated
graphics, video, sound etc. in combination.
A. Physical B. Video and audio.
B. Network C. Text only.
C. Data link D. Light and sound shows only.
D. Transport
Answer: A
Answer: A
Q64.
Q60. If you have to prepare several letters
Junk e-mail is also called ______ having same content but different address
to be sent to many candidates for
A. Spam interview, which one of the following
B. Spoof facilities of a word processing programme
C. Sniffer script will you use?
D. Spool
A. Copy and paste
Answer: A B. Mail merge
C. Find and replace
Q61. D. Format
Which one of the following is the smallest
unit of computer memory? Answer: B
A. RAM
B. Byte
C. Nibble
D. Bit
Answer: D
Q65. Q68.
Which one of the following programmes ‘Wanna Cry’ is a Ransomeware
can read an html language and convert it cryptoworm, which targeted mostly the
into a page which is in readable form? computers running with:
Answer: D Answer: D
Q66. Q69.
Which one of the following is Which one of the following generally
INCORRECT with reference to advantages stores in Read Only Memory (ROM) of a
of magnetic storage? computer?
A. XML
B. HTML
C. Ada
D. XHTML
Answer: A
Q72. Q76.
FTP stands for: What is a serial port that adds a direct
connection to a network?
A. File Translate Protocol
B. File Transit Protocol A. FireWire
C. File Typing Protocol B. NIC (network interface controller)
D. File Transfer Protocol C. USB
D. Internal modem
Answer: D
Answer: B
Q73.
‘WORM’ in context of optical storage Q77.
technology stands for? Linux is a_____
Answer: A Answer: C
Q80. Q84.
‘128 – Bit Era’ is generally referred to: The presentation quality and the size of
image storage depend on:
A. 6th Generation in history of Video Game
Consoles A. Resolution and color depth
B. 9th Generation in history of Video Game B. Color pallets
Consoles C. Color models
C. 7th Generation in history of Video Game D. Color combinations
Consoles
D. 10th Generation in history of Video Answer: A
Game Consoles
Q85.
Answer: A The server Replication is a technique for
improving the performance of server side
Q81. is called:
The art of breaking of ciphers is called:
A. Caching
A. Cryptanalysis B. Mirroring
B. Cryptography C. Flash crowds
C. Cryptology D. Proxy
D. Cipherology
Answer: B
Answer: A
Q86.
Q82. Which is the most important/powerful
A digital signature is a mathematical computer in a typical network?
technique used to check:
A. Network Client
A. The authenticity, integrity and B. Network Station
nonrepudiation of a message C. Network Server
B. The clarity of the messages D. None of the above
C. The attacks from the viruses
D. The handwritten signatures Answer: C
Answer: A Q87.
Which of the following is used by
Q83. browsers to connect to locate the Internet
A technology which uses the hiding of the resources?
information in a picture is called:
A. Linkers
A. Steganography B. Protocol
B. Image Rendering C. Cable
C. Bitmapping D. URL
D. Root kits
Answer: D
Answer: A
Q88. Q91.
WiMAX stands for: Which of the following describes programs
that can run independently travels from
A. Worldwide Interoperability for system to system and disrupt computer
Microwave Access communication?
B. Wireless Interoperability for
Metropolitan Access A. Viruses
C. Worldwide Interoperability for Manual B. Worm
Access C. Trojans
D. Wired Interoperability for Manual D. Droppers
Access
Answer: B
Answer: A
Q92.
Q89. A program that converts high level
A pen shaped device which can sense light, language to machine Language is _______
and is used to point at spots on a video
screen: A. Linker
B. Assembler
A. Mouse C. Compiler
B. Light pen D. None of the above
C. Joystick
D. Plotter Answer: C
Answer: B Q93.
The Mobile Application Protocol (MAP)
Q90. typically runs on top of which protocol?
The term SSD in data storage media stands
for: A. SNMP (Simple Network Management
Protocol)
A. Server static drives B. SMTP (Simple Mail Transfer Protocol)
B. Solid static drives C. HTTP (Hyper Text Transfer Protocol)
C. Solid state drives D. SS7 (Signalling System 7)
D. Static state drives
Answer: D
Answer: C
Q94.
What type of software must to be used to
translate scanned text into a format that can
be manipulated?
A. MIDI
B. CRT
C. RGB
D. OCR
Answer: D
Q95. Q99.
Word processing, spreadsheet, and photo- What is the process of dividing the disk
editing are examples of________ into tracks and sectors?
Answer: D Answer: B
Q96. Q100.
‘Key-loggers’ are a form of: What is the permanent memory built into
your computer called?
A. Firmware
B. Spyware A. RAM
C. Anti-virus B. CPU
D. Operating System C. CD-ROM
D. ROM
Answer: B
Answer: D
Q97.
ASCII represents: Q101.
Which of the following is an example of
A. information system where documents telecommunications device?
and other web resources are identified by
Uniform Resource Locators A. Scanner
B. access to a command-line interface on a B. Joystick
remote host C. Windows 10
C. a malicious software program loaded D. Modem
onto a user's computer
D. a character encoding standard for Answer: D
electronic communication
Q102.
Answer: D A list of protocols used by a system, one
protocol per layer is called:
Q98.
Internet commenced with the development A. Protocol Traffic
of: B. Protocol Key
C. Protocol Stack
A. ARPANET D. Protocol Architecture
B. OECD
C. ICANN Answer: C
D. WebiMax
Answer: A
Q103. Q107.
A computer cannot "boot" if it does not __________ is a server that acts as an
have the _____ intermediary for requests from clients
seeking resources from other servers.
A. Compiler
B. Loader A. Proxy Server
C. Operating system B. FTP Server
D. Assembler C. Telnet server
D. Open Source Server
Answer: C
Answer: A
Q104.
In relation to Stamp duty collection, e- Q108.
SBTR stands for: _________ is a network topology where
each individual piece of a network is
A. Electronic Secure Basic Transaction attached to a central node (often called a
Receipt hub or switch).
B. Electronic Stamp Bank and Treasury
Receipt A. Star topology
C. Electronic Stamp Bank Transaction B. Bus topology
Receipt C. Mesh topology
D. Electronic Secure Bank and Treasury D. Ring topology
Receipt
Answer: A
Answer: D
Q109.
Q105. Register is a ____________
Which of the following is the extension of
graphics files? A. Set of capacitors used to register input
instructions in a digital computer
A. .doc B. Set of paper tapes and cards put in a file
B. .mdb C. Temporary storage unit within the CPU
C. .gif having dedicated or general purpose use
D. .tmp D. Part of the auxiliary memory
Answer: C Answer: C
Q106.
.......... is the process finding errors in
software code.
A. Compiling
B. Assembling
C. Interpreting
D. Debugging
Answer: D
Q110. Q113.
The character coding system The Hexadecimal equivalent of the Binary
‘EBCDIC’ stands for: number 1111100101000111111 is:
Answer: C Answer: A
Q116. Q120.
In software context, SQLite is a: All of the following are examples of input
devices EXCEPT a:
A. Relational Database engine
B. Real-time Operating System A. Scanner
C. Anti-virus Software B. Mouse
D. Network Operating System C. Keyboard
D. Printer
Answer: A
Answer: D
Q117.
ISO 9001 is a Standard for:
Telegram Group:
A. Information Security Management http://t.me/UPSCEPFO2020AOEO
B. Risk Management Answer key available at: http://inspire-
C. Quality Management 1034284054.ap-south-
D. Food Safety Management 1.elb.amazonaws.com/
Answer: C
Q118.
One nibble is equivalent to how many bits?
A. 2
B. 4
C. 8
D. 1
Answer: B
Q119.
Which of the following is not a function of
the Input Unit?
Answer: C