O-Level (M1-R5) IT Tools and Network Basics
O-Level (M1-R5)
Important
200 MCQ for O-Level
Theory Examination
Video Tutorial
O-Level M1-R5 Full Video
Playlist Available on
YouTube Channel UPCISS
Free Online Computer Classes on
YouTube Channel UPCISS
www.youtube.com/upciss
For free PDF Notes
Our Website: www.upcissyoutube.com
1. fuEu esa ls proprietary software dkSu lk gS\
a. AutoCAD
b. Adobe Photoshop
c. CorelDRAW
d. All of the above.
2. LibreOffice esa PowerPoint dks fdl uke ls tkuk tkrk gS\
a. Impress
b. Draw
c. Calc
d. Writer
3. fuEu esa ls RAM, CPU, ROM vkSj Expansion card dks ___ j[krk gS\
a. Hard Disk
b. Floppy Disk
c. Mother Board
d. None of these.
4. fuEufyf[kr esa ls dkSu lh memory data ds fy, backup storage provide
djrh gS\
a. Internal processor memory
b. Primary memory
c. Secondary memory
d. None of these.
5. Operating system fdl rjg dk software gS\
a. Active software
b. System software
c. Application software
d. Interactive software
6. CD-ROM ___ ?
a. Temporary memory
b. Permanent memory
c. Magnetic memory
d. None of these.
7. Information retrieval ¼lwpuk iquizkZfIr½ lcls fast gS\
a. Hard Disk
b. CD
c. SSD
d. All of the above.
8. Internet ij fd, tkus okys dk;Z dks ___ dgk tkrk gS\
a. Surfing
b. Gambling
c. Both (a) and (b)
d. None of these.
9. RAM dk vFkZ gS ___\
a. Random access memory
b. Read only memory
c. Read access memory
d. Random also memory
10. fuEUfyf[kr esa ls dkSu real security vkSj privacy threats ¼xksiuh;rk [krjksa½
dk example gS\
a. Virus
b. Hackers
c. Worm
d. Spam
11. fuEu esa ls dkSu lk ,d secondary memory device gS\
a. CD ROM
b. RAM
c. Both (a) and (b)
d. None of these.
12. Network ds ___ dks csgrj cukus ds fy, password dk use fd;k tkrk
gS\
a. Reliability
b. Security
c. Performance
d. Longevity
13. Computer dks le>us vkSj execute djus okyh language dks ___ dgk
tkrk gS\
a. Machine language
b. High level language
c. Both (a) and (b)
d. None of these.
14. fuEufyf[kr esa ls dkSu ,d anti-virus program gS\
a. K7
b. Quick heal
c. Norton
d. All of the above.
15. fuEufyf[kr esa ls dkSu input device ugh gS\
a. Microphone
b. Mouse
c. Scanner
d. None of these.
16. Firewall ,d izdkj dk gS ___ \
a. Security threat
b. Worm
c. Virus
d. None of these.
17. ,d E-mail ID esa D;k gksrk gS\
a. Letters, numbers
b. Letter, number, @
c. Username
d. None of these.
18. Secure Electronic Transaction protocol dk mi;ksx fd;k tkrk gS\
a. Credit card payment
b. Payment of small amounts for internet services
c. Electronic cash payment
d. Cheque payment
19. Crypto currency is a ___ ?
a. Plastic money
b. Digital payment
c. Digital medium of exchange
d. None of these.
20. buesa ls dkSu lk E-mail medium ugh gS\
a. Extranet
b. Internet
c. Paper
d. Internet
Answer sheet-
1.d
2.a
3.c
4.c
5.b
6.b
8.a
9.a
10.d
11.a
12.b
13.a
14.d
15.d
16.d
18.a
19.c
20.c
21. Operating system ‘kCn dk vFkZ gS\
a. Program dk ,d set tks Computer ds work dks control djrk gSA
b. ftl rjg ls Computer operator work djrk gSA
c. High level language dk Machine level language esa conversion.
d. Floppy disk drive ftl rjg ls operate gksrh gSA
22. Instagram fdlls related gS\
a. Facebook
b. Microsoft
c. Google
d. YouTube
23. IMAP Protocol dk mi;ksx fraud mailers }kjk fdl purpose ds fy, fd;k
tkrk gS\
a. Send spam
b. Send fake mails
c. Hack e-mail
d. All of the above.
24. Computer dk operating system users vkSj ___ ds chp ,d software
interface ds :i esa dk;Z djrk gS
a. Memory
b. Peripheral
c. Hardware
d. Screen
25. Default :i ls windows 10 vius vki battery sever feature dks pkyw
dj nsrk gS tc Laptop dk battery charge uhps fxjrk gS\
a. 15 %
b. 20 %
c. 5 %
d. 10 %
26. Screen background vkSj window dk main area gS tgka vki program
open and restrict ¼izfrcaf/kr½ dj ldrs gSa\
a. Windows settings
b. Desktop
c. Application window
d. All application
27. ,d application dks desktop ij shortcut ds tfj, open fd;k tk ldrk
gS\
a. blds shortcut ij double click djsa
b. Open option ij right click djsa vkSj select djsa
c. Icon dks select djsa vkSj Enter key ncka,
d. All of the above.
28. LibreOffice esa Power Point dks fdl uke ls tkuk tkrk gS\
a. Writer
b. Calc
c. Impress
d. Draw
29. Printer and Scanner option esa ,d u;k printer dgk¡ add fd;k tk ldrk
gS\
a. Control Panel
b. File Manager
c. Dynamic data exchange
d. None of these.
30. GUI dk mi;ksx ___ interface ds chp fd;k tkrk gS\
a. Hardware and Software
b. Human and Machine
c. Software and Users
d. None of these.
31. Start menu ls vki ___ access dj ldrs gSa\
a. Lock your computer
b. Search for Applications, Settings and Files
c. Turn off your computer
d. All of the above.
32. vki file explorer esa viuh files and folders dk mi;ksx djds navigate
dj ldrs gSa\
a. Address bar
b. Forward and backward button
c. Search function
d. All of the above.
33. Windows 10 esa ‘Sleep’ dk D;k vFkZ gS\
a. Computer dks safe mode esa restart djsaA
b. Computer dks sleep mode esa restart djsaA
c. lHkh running applications dks end djrs gq, Computer dks off
djsaA
d. py jgs application dks can fd, fcuk Computer dks shutdown
djsaA
34. Operating system dk dk;Z D;k gS\
a. Computer ds lalk/kuksa (resources) dks cgqr dq’kyrk ls izfrcaf/kr
(restricted) djrk gSA
b. Execution ds fy, Scheduling Job dh ns[kHkky djrk gSA
c. Data and instructions ds flow dk management djrk gSA
d. All of the above.
35. MS-Word esa gutter margin D;k gS\
a. Margin tks print djrs le; left margin esa add fd;k tkrk gSA
b. Margin tks print djrs le; page margin ds binding side esa add
fd;k tkrk gSA
c. Margin tks print djrs le; right margin esa add fd;k tkrk gSA
d. Margin tks print djrs le; page ds outside esa add fd;k tkrk
gSA
36. fuEufyf[kr esa ls dkSu lcls rst] lcls cM+s vkSj lcls egaxs Computer
dks lanfHkZr djrk gS\
a. Super Computer
b. Personal Computer
c. Laptop
d. Notebook
37. tc ms-word load gks tkrk gS] rks opening screen ij ,d document
fn[kkbZ nsrk gS ftldk uke gS\
a. Document1
b. Document
c. Doc1
d. None of these.
38. Ms-word dqN method provide djrk gS ftuds }kjk vki ,d document
esa ?kwe ldrs gSa\
a. Scroll djds
b. fdlh particular page ij tkdj
c. Both (a) and (b)
d. None of these.
39. Ms-word esa right aliment dh shortcut key D;k gS\
a. Ctrl+E
b. Ctrl+L
c. Ctrl+R
d. None of these.
40. ;fn vkidk document 200 ls vf/kd zoom gS] rks text area esa fdrus
scroll bar fn[kkbZ nsrs gSa\
a. 4
b. 2
c. 1
d. 3
Answer sheet-
21.a
22.a
23.d
24.c
25.b
26.c
28.c
29.a
30.c
31.d
32.d
33.d
34.d
35.b
36.a
38.c
39.c
40.b
41. Ms-word esa Chart insert djus ds fy, vki fdl Tab dk mi;ksx djsaxs\
a. View
b. References
c. Insert
d. Page layout
42. Ms-word esa Page margin dks cnyus ds fy, vki fdl Tab dk mi;ksx
djsaxs\
a. Page layout
b. View
c. Insert
d. Home
43. dkSu lk Tab Different izdkj ds Font fn[kkrk gS tks mi;ksx ds fy,
available gS\
a. View
b. Page layout
c. References
d. Home
44. Print gksus ij Document dks ns[kus ds fy, vki fdl page view dk mi;ksx
dj ldrs gSa\
a. Outline view
b. Draft view
c. Read mode
d. Print layout
45. Ms-word 2013 esa fuEufyf[kr esa ls dkSu lk feature ugh gS\
a. Ribbon
b. Button
c. Chart
d. Drop down menu
46. Top ij fLFkr NksVs Toolbar dk uke D;k gS tks save disk option fn[krk
gS\
a. My document
b. Quick access
c. Title bar
d. None of these.
47. Insert ribbon command dkSu lh ugh gS\
a. Shape
b. Clip art
c. Page number
d. None of these.
48. Cell esa data enter djus ds fy, fuEufyf[kr esa ls fdl method dk mi;ksx
ugh fd;k tk ldrk gS\
a. Press the arrow key
b. Press the tab key
c. Press the Esc key
d. Click on formula bar
49. Excel file dk extension gS ___\
a. .TMT
b. .XXL
c. .xlsx
d. None of these.
50. Excel window esa dkSu lk area value vkSj formula enter djus dh vuqefr
nsrk gS\
a. Home tab
b. Format tab
c. Formula bar
d. Design tab
51. Excel esa fuEufyf[kr esa ls dkSu lk valid data type ugh gS\
a. Number
b. Character
c. Date and time
d. None of these.
52. Cell reference B2:B9 dks absolute row vkSj column reference esa
replace djus ds fy, fuEufyf[kr esa ls dkSu lk lgh gS\
a. B2:B9
b. $B$2:$B$9
c. B$2:B$9
d. None of these.
53. vki daily basis ij share market dh progress dks track djuk pkgrs gSa]
mlds fy, vkidks fdl izdkj ds chart dk mi;ksx djuk pkfg,\
a. Pie chart
b. Line chart
c. Column chart
d. None of these.
54. fuEufyf[kr esa ls dkSu ,d financial work ugh gS\
a. IPMT()
b. SUM()
c. NPV()
d. PMT()
55. vki drag and drop method dk mi;ksx dj ldrs gSa ___ \
a. Cell content dh copy cukus esa
b. Cell content move djus esa
c. Cell content tksM+us esa
d. Both (a) and (b)
56. izR;sd workbook ds bottom esa fn[kkbZ nsus okys tab dks D;k dgk tkrk
gS\
a. Location tab
b. Sheet tab
c. References tab
d. None of these.
57. tc ,d formatted number ,d cell ds Hkhrj fit ugh gksrh gS] rks ;g
display gksrk gS\
a. #####
b. #DIV@
c. #DIV/0
d. None of these.
58. Excel esa SUM() function ds laca/k esa fuEufyf[kr esa ls dkSu lk syntax
lgh gS\
a. =SUM(A1,B1)
b. =SUM(A1:B9)
c. =SUM(A1:A9,B1:B9)
d. All of the above.
59. ,d worksheet esa dbZ cells dk selection djus ds fy, vki hold djrs
le; cells ij click djsaxs ___\
a. Alt key
b. Ctrl+Shift key
c. Shift key
d. Ctrl key
60. New slide insert djus ds fy, fuEu esa ls fdl shortcut dk mi;ksx fd;k
tkrk gS\
a. Ctrl+M
b. Ctrl+N
c. Ctrl+O
d. None of these.
Answer sheet-
41.c
42.a
43.d
44.d
45.d
46.b
48.c
49.c
50.c
51.b
52.b
53.b
54.b
55.d
56.b
58.d
59.d
60.a
61. Default :i ls power point document dk extension D;k gksrk gS\
a. .EXT
b. .COM
c. .ppt
d. None of these.
62. Handout master esa footer area fn[kkbZ nsrk gS ___ \
a. Top of page
b. Bottom of page
c. Center of page
d. None of these.
63. vki ___ }kjk slide show ds nkSjku shortcut menu fn[kk ldrs gSa\
a. Ribbon ij shortcut button ij click djds
b. Present slide ij right-click djds
c. Present slide ij ,d icon ij click djds
d. Both (a) and (b)
64. fuEufyf[kr esa ls dkSu vkidks ,d presentation esa ls ,d ls vf/kd slide
dk selection djus dh permission nsrk gS\
a. Alt key ds lkFk esa izR;sd slide ij click djsa
b. izR;sd slide dks shift key ds lkFk esa drag djsa
c. izR;sd slide ij shift ds lkFk esa click djsa
d. izR;sd slide ij click djsa
65. vius handout esa header ;k footer dks add djus ds fy, vki mi;ksx
dj ldrs gS\
a. Header / Footer
b. Page number
c. Comments
d. None of these.
66. NIC D;k gS\
a. Network interface card
b. Network information card
c. Network interface computer
d. Network information computer
67. Internet ds mi;ksx D;k gS\
a. Communication
b. Information retrieval
c. Presentation of information
d. All of the above.
68. fuEufyf[kr esa ls dkSu ,d internet browser ugh gS\
a. Netscape navigator
b. Edge
c. Drupal
d. Opera
69. IMEI D;k gS\
a. Mobile equipment international identity
b. International mobile equipment identity
c. International law instrument identity
d. None of these.
70. Browsing web ds fy, cable dk mi;ksx djus ds fy, vkidks ___
vko’;drk gksxh\
a. A cable modem
b. Network interface card
c. Both (a) and (b)
d. None of these.
71. Broadband connection ds fy, minimum bandwidth dh vko’;drk
gS\
a. 128 kbps
b. 256 kbps
c. 512 kbps
d. None of thse.
72. Webpage dks specific :i ls igpkuk tkrk gS\
a. IP Address
b. Domain
c. URL
d. Name of file
73. fuEufyf[kr esa ls dkSu lk networking solution fdlh building esa
networking ds fy, mi;qDr gS\
a. WAN
b. MAN
c. LAN
d. All of the above.
74. Internet protocol dsoy igpkurk gS\
a. IP Address
b. Home Address
c. Doc Address
d. None of these.
75. fuEufyf[kr esa ls dkSu lk symbol e-mail address ds nks Hkkxksa dks vyx
djrk gS\
a. #
b. &
c. @
d. None of these.
76. vius inbox ls dksbZ message delete djus ls igys vkidks D;k djus dh
vko’;drk gS\
a. Delete the message
b. Select the message
c. Message dks Deselect djsa
d. None of these.
77. tc users dks e-mail download djuk gks rks mail access client ___ ls
‘kq: gksrk gS\
a. Mail box
b. Doc server
c. Mail host
d. Internet
78. Digital India igy ds rgr online registration system developed gqvk
Fkk\
a. National information center
b. Nationalism information center
c. National Informatics Centre
d. None of these.
79. fuEufyf[kr esa ls dkSu ,d Social Networking Site ugh gS\
a. Facebook
b. LinkedIn
c. Twitter
d. Epic
80. Umang App ij dkSu lh Services Available gSa\
a. Employees Provident Fund Organization (EPFO)
b. Pension Portal
c. Both (a) and (b)
d. None of these.
Answer sheet-
61.c
62.b
63.b
64.c
65.a
66.a
68.c
69.b
70.c
71.b
72.c
73.c
74.a
75.c
76.b
78.c
79.d
80.c
81. Twitter is a example of ___ ?
a. Web URL
b. Social networking
c. E-mail system
d. System application
82. tc slide ls text box object dks delete dj fn;k tkrk gS rks ___\
a. Object delete gks tkrk gS] ysfdu slide ij ,d text box vkSj text
delete ugh gksrk gSA
b. Text box vkSj text nksuksa delete gks tkrs gSaA
c. Text box delete gks tkrk gS] vkSj text slide ij paste gks tkrk gSA
d. Text delete gks tkrk gS] vkSj text box slide ij paste gks tkrk gSA
83. Size of IPV4 is ___ ?
a. 62
b. 48
c. 128
d. 32
84. Website ds main page dks dgk tkrk gS ___ ?
a. Bookmark
b. Index page
c. Home page
d. Main page
85. fuEu esa ls dkSu lk file extensions paint esa cukbZ xbZ file dks indicate
djrk gS\
a. .ppt
b. .xlsx
c. .doc
d. .bmp
86. fuEufyf[kr esa ls dkSu ,d search engine ugh gS\
a. Windows
b. Google
c. Bing
d. Yahoo
87. OTP Stands for ___ ?
a. On time password
b. One time password
c. Other time password
d. None of these.
88. fuEufyf[kr esa ls fdlds ikl digital :i ls money transfer dh
Minimum dksbZ lhek ugh gS\
a. RTGS
b. Cheque
c. NEFT
d. IMPS
89. CC in E-mail stands for ___ ?
a. Carbon coupon
b. Consider copy
c. Carbon copy
d. Carbon catch
90. dkSu lk option gesa ,d gh letter dks vyx&vyx yksxksa dks send djus esa
help djrk gS\
a. Templet
b. Multiple letter
c. Macros
d. Mail merge
91. Office dk use djrs le; help ysus ds fy,] vki click djsaxs ___ \
a. F4 key
b. F1 key
c. F3 key
d. F2 key
92. Cell address dks absolute cukus ds fy, bLrseky fd;k tkus okyk
symbol\
a. !
b. #
c. $
d. @
93. Size of IPV6 is ___ ?
a. 128
b. 62
c. 48
d. 32
94. Telecommunication }kjk Computer, storage messages dk
vknku&iznku djrk gS\
a. E-web
b. E-mail
c. E-net
d. E-chart
95. USSD stands for ___ ?
a. Unstructured Supplementary Service Data
b. Untransmitted Supply Service Data
c. Untransmitted Supplemental Service Data
d. None of these.
96. Presentation esa slides dks introduce djus ds fy, bLrseky fd, tkus
okys special effects dks bl izdkj tkuk tkrk gS ___ \
a. Custom animation
b. Annotations
c. Effects
d. Transitions
97. “Passport Seva” website is ___ ?
a. www.e-passportindia.gov.
b. www.passportindia.gov.in.
c. www.pasportindia.edu.
d. www.pasportindia.com.
98. Spreadsheet ls ge D;k ugh dj ldrs gSa\
a. Create a charts
b. Create a graphs
c. Calculations
d. Create Graphics
99. vki word dictionary esa available ugh gksus okys words dks blesa add
dj ldrs gSa\
a. Live dictionary
b. Custom dictionary
c. User dictionary
d. My dictionary
100. 1 kilobyte ___ cjkcj gksrk gS\
a. 202400 bytes
b. 1043876 bytes
c. 1048 bytes
d. 1024 bytes
Answer sheet-
81.b
82.b
83.d
84.c
85.d
86.a
88.c
89.c
90.d
91.b
92.c
93.a
94.b
95.a
96.d
98.d
99.b
100.d
101. UPI Stands for ___ ?
a. Unified Payment Interface.
b. Union Paid Interface.
c. Both (a) and (b)
d. None of these.
102. Portrait dk mi;ksx page orientation dks lanfHkZr djus ds fy, fd;k tkrk
gS\
a. Flip
b. Reverse
c. Horizontal
d. Vertical
103. UPI is a payment service ___ ?
a. Offline
b. Online
c. Both (a) and (b)
d. None of these.
104. UPI fdlds }kjk ‘kq: fd;k x;k Fkk\
a. Urjit patel
b. R Gandhi
c. Raghuram rajan
d. Narendra modi
105. UMANG is integrated with ___ ?
a. DigiLocker only
b. Aadhaar only
c. Aadhaar and DigiLocker
d. None of these.
106. National Electronic Funds Transfer (NEFT) System ds ckjs esa
fuEufyf[kr esa ls dkSu lk xyr gS\
a. NEFT ds ek/;e ls ysu&nsu dh dksbZ limit ugh gSA
b. NEFT per hour ¼izfr ?kaVk½ ds base ij lapkfyr gksrk gSA
c. NEFT ,d payment system gS] tks ,d&ls&,d fund transfer dh
lqfo/kk provide djrh gSA
d. All of the above.
107. vkerkSj ij e-mail ds lkFk dkSu lk box overflow gksrk gS\
a. Message box
b. Address box
c. Outbox
d. Inbox
108. Aadhaar Enabled Payment System (AePS) Banking ysu&nsu dh vuqefr
nsrk gS\
a. Balance inquiry
b. Cash withdrawal
c. Cash deposit
d. All of the above.
109. G-mail ,d software gS] ftldk mi;ksx ___ ds fy, fd;k tkrk gS\
a. Search files
b. Check e-mails
c. Search web pages
d. None of these.
110. Bitcoin fdlus cuk;k\
a. Satoshi Nakamoto
b. Samsung
c. Jon maikafi
d. None of these.
111. ___ E-mail utility dk ,d example gS\
a. Excel
b. Photoshop
c. Outlook
d. MS-word
112. dkSu lk IOT dk element ugh gS\
a. Security
b. Process
c. People
d. Things
113. Memory esa bits dk group tks fdlh izdkj dh information ;k data dks
represent djus ds fy, mi;ksx fd;k tkrk gS] ___ ds :i esa tkuk tkrk gS\
a. PROM
b. SRAM
c. Memory
d. Byte
114. Internet of things (IOT) ls tqM+s devices dks automatic communication
djuk gS] u fd humans ds through. bls D;k dgk tkrk gS\
a. Business-to-business (B2B)
b. Machine-to-machine (M2M)
c. Intercloud
d. Skynet
115. fuEufyf[kr esa ls dkSu lk ,d ,slk application gS] tks users dks simple
document create djus vkSj mls edit djus dh vuqefr nsrk gS\
a. Browser
b. E-mail utility
c. Spreadsheet
d. Word processor
116. blockchain technology D;k gS\
a. ,d peer-to-peer network ij distributed ledger ¼cgh[kkrk½A
b. ,d izdkj dk cryptocurrency.
c. Exchange djukA
d. ,d centralized ledger.
117. Computer esa information dsoy read djus ds fy, memory fdlds }kjk
stored dh tkrh gS\
a. Engineer
b. Manufacturer
c. Programmer
d. User
118. fdlh file esa ekStwn dqy lines, words vkSj characters dks count djus ds
fy, fdl command dk use fd;k tkrk gS\
a. countw
b. wcount
c. word count
d. None of these.
119. Mouse ds through Computer esa enter fd;k x;k data fdldk example
gS\
a. Direct input
b. Indirect input
c. Command
d. Instruction
120. Mobile application part (MAP) vkerkSj ij fdl protocol ds top ij
run gksrk gS\
a. Hyper text transfer protocol (HTTP)
b. Signaling system 7 (SS7)
c. Simple mail transfer protocol (SMTP)
d. Simple network management protocol (SNMP)
Answer sheet-
101.a
102.d
103.b
104.c
105.c
106.a
108.d
109.b
110.a
111.c
112.c
113.d
114.b
115.d
116.a
118.c
119.b
120.b
121. Linux esa fdlh file dks delete djus ds fy, fdl command dk mi;ksx
fd;k tkrk gS\
a. dm
b. rm
c. delete
d. erase
122. The full form of OSI is ?
a. Open system interconnection
b. Operating system internet
c. Optical system interconnection
d. Operating system interface
123. fuEufyf[kr esa ls dkSu lk transmission directions ,d valid
transmission ugh gS\
a. Double duplex
b. Full duplex
c. Half duplex
d. Simplex
124. Spreadsheet esa letters dk use ___ dks represent djus ds fy, fd;k
tkrk gS\
a. Blocks
b. Columns
c. Rows
d. Cells
125. OSI model esa fdrus layers gksrs gSa\
a. 6 layers
b. 5 layers
c. 7 layers
d. 9 layers
126. The full form of POP is ___ ?
a. Post of protocol
b. Post office protocol
c. Pre office protocol
d. None of these.
127. buesa ls dkSu serial data transmission ds fy, ,d ekud (standard)
interface gSa\
a. Centronics
b. 2
c. RS232C
d. ASCII
128. POP dk port number D;k gS\
a. 43
b. 25
c. 35
d. 110
129. Directory dks gVkus ds fy, fdl command dk iz;ksx fd;k tkrk gS\
a. rdir
b. remove
c. rd
d. rmdir
130. Electrical interface ds laidZ esa vkus okys Computer network esa data
ys tkus ds fy, fdl type dk transmission medium lcls mi;qDr gS\
a. Coaxial cable
b. Microwave
c. Unshielded twisted pair
d. Optical fiber
131. fuEufyf[kr esa ls dkSu lk ,d bit-oriented protocol gS\
a. Hyper Text Transfer Protocol (HTTP)
b. High-level Data Link Control (HDLC)
c. Secure Sockets Layer (SSL)
d. None of these.
132. fuEufyf[kr esa ls dkSu lk ,d network topology ugh gS\
a. Peer to peer
b. Bus
c. Ring
d. Mesh
133. Currently running processes dks display djus ds fy, fdl command
dk mi;ksx fd;k tkrk gS\
a. du
b. pip
c. ps
d. au
134. ml device dh igpku djsa] tks nks ltkrh; (homogeneous) packet
broadcast local network dks link djrk gS\
a. Gateway
b. Bridge
c. Router
d. Hub
135. og communication method ftlesa ,d time ij flQZ ,d gh direction
esa data transmit dj ldrs gSa ___ dgykrk gS\
a. Half duplex
b. Full duplex
c. Simplex
d. None of these.
136. Computer data dks store djus vkSj mls calculate djus ds fy, ___
number system dk mi;ksx djrk gS\
a. Binary
b. Octal
c. Decimal
d. Hexadecimal
137. The binary system uses power of ___ ?
a. 16
b. 8
c. 10
d. 2
138. fuEufyf[kr esa ls fdldk mi;ksx network ds fy, resources ¼lalk/kuksa½ dks
allocate vkSj manage djus ds fy, fd;k tkrk gS\
a. Node
b. Server
c. Bluetooth
d. None of these.
139. IP Address ds fdrus versions available gSa\
a. 4 version
b. 1 version
c. 6 version
d. 2 version
140. Users dks virus dk irk yxkus vkSj muls cpus esa help djus ds fy, eq[;
:i ls fdl software dk mi;ksx fd;k tkrk gS\
a. Malware
b. Antivirus
c. Both (a) and (b)
d. None of these.
Answer sheet-
121.b
122.a
123.a
124.b
125.c
126.b
128.d
129.d
130.d
131.b
132.a
133.c
134.b
135.a
136.a
138.b
139.d
140.b
141. fuEufyf[kr esa ls dkSu lh layer TCP/IP model esa present ugh gS] ysfdu
OSI model esa include gS\
a. Transport layer
b. Application layer
c. Session layer
d. Network layer
142. Internet ij hyperlinked fd, x, documents dk collection gS\
a. Mailing list
b. E-mail system
c. World Wide Web (WWW)
d. None of these.
143. fuEUfyf[kr esa ls dkSu lk domain dk xyr example gS\
a. upciss::com
b. Upcissyoutube.com
c. Upciss.co.in
d. None of these
144. Domain name system (DNS) fdlh domain name dks fdlds fy,
translate djrk gS\
a. URL
b. Binary
c. IP
d. Hexa
145. Internet ij fdlh resource dh location fdlds }kjk nh tkrh gS\
a. URL
b. Protocol
c. IP
d. E-mail
146. The full form of HTTP is ___ ?
a. Hyper text transfer program
b. Hyper text transfer protocol
c. Hyper text terminal protocol
d. None of these.
147. Identify the class of computer threats.
dEI;wVj [krjksa ds oxZ dh igpku djsa\
a. Soliciting
b. DOS attack
c. Phishing
d. None of these.
148. fuEufyf[kr esa ls dkSu lh memory non-volatile gS\
a. ROM
b. DRAM
c. SRAM
d. All of the above.
149. ___ Computer ds :i esa ,d proxy server dk mi;ksx fd;k tkrk gS\
a. Accessing user permission
b. Performing file handling
c. Acting as a backup
d. With external access
150. ___ LAN users dks computer program vkSj data share djus dh
permission nsrk gS\
a. File server
b. Data server
c. Communication server
d. None of these.
151. dkSu lh transmission technique xkjaVh nsrh gS fd data packets receiver
dks mlh order esa received gksaxs] ftl order esa os sender }kjk Hksts x, Fks\
a. Circuit switching
b. Packet switching
c. Unicasting
d. Broadcasting
152. fuEufyf[kr esa ls fdls cyber security dk ,d element ekuk tkrk gS\
a. Application security
b. Operational security
c. Network security
d. All of the above.
153. dkSu lh memory non-volatile gksrh gS vkSj bls dsoy ,d ckj fy[kk tk
ldrk gS\
a. PROM
b. EPROM
c. EEPROM
d. RAM
154. tc mail server other mail servers dks mail Hkstrk gS] rks ;g ___ gks
tkrk gS\
a. SMTP Server
b. SMTP Client
c. Peer to peer
d. None of these.
155. Proxy server dks fdl name ls Hkh tkuk tkrk gS\
a. Application proxy
b. Proxy tools
c. Application-level gateway
d. None of these.
156. IP security ds nks modes dkSu ls gSa\
a. Preshared and transport
b. Certificate and tunnel
c. Transport and tunnel
d. Transport and certificate
157. ml malware dh igpku djsa] tks fdlh infection ds through izfrÑfr
(replicate) ;k clone ugh djrk gS\
a. Virus
b. Worms
c. Trojans
d. None of these.
158. Binary numbering system esa 0 vkSj 1 dks binary digit ;k ___ dgk tkrk
gS\
a. Bits
b. Decimal bytes
c. Kilobytes
d. Bytes
159. fuEufyf[kr esa ls fdldk mi;ksx 802.3 Ethernet ds medium ds :i esa
ugh fd;k tk ldrk gS\
a. A fiber optical cable
b. A microwave link
c. A twisted pair cable
d. A thin coaxial cable
160. ml network dh igpku djsa] tks ,d public network ij ,d private
network dk foLrkj djrk gS\
a. Local Area Network
b. Enterprise Private Network
c. Virtual Private Network
d. Storage Area Network
Answer sheet-
141.c
142.c
143.a
144.c
145.a
146.b
148.a
149.d
150.a
151.a
152.d
153.a
154.b
155.c
156.c
158.a
159.b
160.c
161. Encryption vkSj Decryption ___ Layer dh responsibility gS\
a. Datalink
b. Application
c. Network
d. None of these.
162. TCP/IP stack dh dkSu lh layer OSI model transport layer ls esy [kkrh
gS\
a. Network access
b. Internet
c. Application
d. Host to host
163. What is a HUB ?
a. Calculating device
b. Network device
c. Computing device
d. Software
164. Database management system ds operation ds fy, fuEu esa ls dkSu
lk hardware component lcls important gS\
a. Plotter
b. High speed, large-capacity disk
c. Printer
d. High-resolution video display
165. fuEufyf[kr esa ls dkSu lk network dynamic ;k adaptive routing dk
iz;ksx djrk gS\
a. System Network Architecture (SNA)
b. ARPANET
c. TYMNET
d. None of these.
166. Free calls djus ds fy, hackers }kjk bLrseky dh tkus okyh lcls iqjkuh
phone hacking technique dh igpku djsa\
a. Phishing
b. Cracking
c. Phreaking
d. Spamming
167. The term IPv4 stands for ___ ?
a. International Programming Version 4
b. Internet Programming Version 4
c. Internet Protocol Version 4
d. None of these.
168. What does a set of rules define?
a. Protocol
b. IMAP
c. FTP
d. SMTP
169. fdlh file esa time-to-time records dks add djuk] mls change djuk vkSj
delete djuk ___ dgykrk gS\
a. Renewing
b. Restructuring
c. Upgrading
d. Updating
170. Computer dk basic architecture fdlds }kjk developed fd;k x;k Fkk\
a. Garden Moore
b. Blaise Pascal
c. Charles Babbage
d. John Von Neumann
171. fuEufyf[kr esa ls fdl platforms dk mi;ksx cloud esa information dh
safety vkSj protection ds fy, fd;k tkrk gS\
a. One drive
b. Cloud security protocols
c. Cloud workload protection platforms
d. None of these.
172. buesa ls dkSu nks Computers ds chp esa data share djrk gS\
a. Integrated system
b. Grouping
c. Network
d. Library
173. fuEufyf[kr esa ls igpkfu,] ftldk mi;ksx eq[; :i ls website dks host
djus ds fy, fd;k tkrk gS\
a. Database Server
b. Web Server
c. Mail Server
d. None of these.
174. Database management system dks D;k name fn;k x;k gS tks full text
data, image data, audio vkSj video dks handle djus esa l{ke gS\
a. Hypertext
b. Multimedia
c. Graphics media
d. Full media
175. og time ftlds nkSjku computer }kjk fdlh dk;Z dks lalkf/kr (processed)
fd;k tkrk gS\
a. Waiting Time
b. Real Time
c. Delay Time
d. Execution Time
176. Wi-fi security esa fdl protocol dk lcls vf/kd iz;ksx fd;k tkrk gS\
a. WPA2
b. WPA
c. WPS
d. None of these.
177. Default :i ls LibreOffice writer esa line spacing ___ gS\
a. 1.5
b. Double
c. Single
d. None of these.
178. Internet banking dk mi;ksx djus ds fy, customer dks fuEufyf[kr esa
ls fdldh t:jr iM+rh gS\
a. Customer ID and password
b. Customer name and password
c. Customer ID and date of birth
d. Customer ID and phone number
179. Cookie visibility ds scope dks configure djus ds fy, fuEu esa ls fdldk
mi;ksx fd;k tk ldrk gS\
a. Path
b. Domain
c. Server
d. Both (a) and (b)
180. fuEufyf[kr esa ls dkSu lh topology arrangements ,d point-to-point
configuration gS\
a. Star topology
b. Mesh topology
c. Ring topology
d. All of the above.
Answer sheet-
161.b
162.d
163.b
164.b
165.b
166.c
168.a
169.d
170.d
171.c
172.c
173.b
174.b
175.d
176.a
178.a
179.d
180.b
181. fuEufyf[kr esa ls dkSu ,d valid e-mail address gS\
a. upciss@gmail.com
b. upciss@gmail
c. gmail.com
d. None of these.
182. fuEufyf[kr esa ls dkSu lk database administrator dk function gS\
a. Performance Monitoring
b. Backup the Database
c. Database Design
d. All of the above.
183. fuEufyf[kr esa ls dkSu computer dh fo’ks”krk ugh gS\
a. Automation
b. Versatility
c. Speed
d. Intelligence
184. The full form of DBMS is ___ ?
a. Database Management Software
b. Domain based Management Software
c. Database Management System
d. Digital Bar Management System
185. fuEufyf[kr esa ls ,d sequential access memory gS\
a. Optical Disk
b. Magnetic Disk
c. Magnetic Tape
d. None of these.
186. BIOS ,d izdkj dk gksrk gS ___ \
a. Operating System
b. Hardware
c. Software
d. None of these.
187. What is Worm Booting ¼Worm Booting D;k gS½\
a. Starting the Computer normally
b. Restart Computer
c. Both (a) and (b)
d. None of these.
188. fdlh image ds unwanted ¼vokafNr½ part dks remove djus dh process
dgykrh gS\
a. Cropping
b. Merging
c. Cutting
d. Hiding
189. fdlh document ds first 5 pages dks print djus ds fy, dkSu lh
command nh tk,xh\
a. Print all
b. From__ To__
c. Both (a) and (b)
d. None of these.
190. What is the output of Round(1550,-2)?
a. 1800
b. 1740
c. 1600
d. 1700
191. fdlh shape ;k picture dks rotate djus ds fy, fdl animation dk use
fd;k tkrk gS\
a. Flyer over
b. Zoom
c. Color plus
d. Spin
192. First graphical browser Fkk ___\
a. Opera
b. Chrome
c. Edge
d. Mosaic
193. ___ protocol dk mi;ksx remote login }kjk fd;k tkrk gS\
a. SMTP
b. Telnet
c. FTP
d. HTTP
194. fuEufyf[kr esa ls dkSu valid domain name gS\
a. www.upcissyoutube.com
b. www.com.upcissyoutube
c. Both (a) and (b)
d. None of these.
195. ___ SMTP dk mi;ksx message send djus ds fy, fd;k tkrk gS\
a. User Mailbox
b. User Terminal
c. Both (a) and (b)
d. None of these.
196. ge telegram group esa maximum fdrus yksxksa dks add dj ldrs gSa\
a. 150000
b. 500000
c. 200000
d. 50000
197. fuEufyf[kr esa ls dkSu Internet ds ek/;e ls funds transfer djus dk ,d
method gS\
a. Core Banking
b. NEFT
c. SMTP
d. MICR
198. BHIM UPI ds through ,d fnu esa fdruk iSlk Hkstk tk ldrk gS\
a. 1 lakh
b. 5 lakhs
c. 20 lakhs
d. 50 thousand
199. Which is benefit of cloud computing?
a. More secure
b. Fast speed
c. Low cost
d. All of the above.
200. fuEufyf[kr esa ls dkSu ,d cryptocurrency gS\
a. Bitcoin
b. Voice coin
c. Sia coin
d. All of the above.
Answer sheet-
181.a
182.d
183.d
184.c
185.c
186.c
188.a
189.b
190.c
191.d
192.d
193.b
194.a
195.c
196.c
198.a
199.d
200.d
It takes a lot of hard work to make notes, so if you can pay some fee 100, 200
rupees which you think is reasonable, if you are able to Thank you...
       ,   100, 200   
  pay  ,   , 