2. 1. Ethernet uses following technology
a) CSMA
b) CSMA/CD
c) Token passing
d) CSMA/CA
2. Maximum number of column in a Libre Spreadsheet is
a) ASP
b) AMJ(1,024), 1,048,576 (220
))
c) MMA
d) AJM
3. In which view note panes appear
e) Notes view
f) Slide Sorter
g) Slide show
h) Normal View
4. In google drive the user can send attachment all over
i) 25MB
j) 35Mb
k) 30MB
l) 50MB
3. 5. It is a standalone malware computer program that replicate itself and spread to other
computers
a) Disk cleanup
b) Operating system
c) Worm
d) Hardware
6. Physical arrangement of network is
e) Networking
f) Routing
g) Configuring
h) Topology
7. When was vacuum tube invented
i) 1900
j) 1910
k) 1880
d) 1906(Lee de Forest )
8. What is it called when I need to move an object in 3d?
l) Grab
m) Push
n) Translate
o) Move
4. 9. Personal computer is a
a) Mainframe
b) None of the Option
c) Mini Computer
d) Micro computer
10. Credit or Debit Card is related to
e) Electronic commerce
f) Internet cash
g) Offline cash
h) Electronic cash
11. To protect against phising, what is the recommendation for changing your finance
passwords
i) Every 12 months
j) No need to change
k) Every 2 months
l) Every 6 months
12. Mail access starts with Client when user needs to download e-mail from the
m) Internet
n) Mail Server
o) Mail box
p) IP server
5. 13. Which is used with stylus to produce freehand drawings
a) Light pen
b) Reflector
c) Drawing Pen
d) Graphic Tablets
14. E governance is the implementation of ICT in the government department where the
ICT stands for
e) Information and Control of transaction Technology
f) Information and Communication Technology
g) Immediate communication Technology
h) Immediate information transfer and communication technology
15. Scrollbar Option is available in which menu
i) Table
j) View
k) Insert
l) File
16. Wrap text in spreadsheet is
m) Merge Multiple Cells
n) None of the obove
o) Allign Text Center
p) Multiple line of text in a cell
6. 17. What is a trigger in context of animations
a) The name of the motion path
b) An item on the slide that performs an action when clicked
c) An action button that advances to the next slide
d) An object to be inserted in the Libre office Impress
18. Which is not a system tool
e) Back up
f) Folder
g) Scandisk
h) Defrag
19. The rate of transfer of data in LAN is
i) Tera bits per second
j) Kilo bits per second
k) Mega bits per second
l) Bits per second
20. Gutter margin in ms-word is used for
m) Typing
n) Grinding
o) Sliding
p) Binding
7. 21. What is a light pen
a) Optical output device
b) Optical input device
c) Mechanical input device
d) Electronic input device
22. Which key or key combination will move to insertion point to the bottom of your
document
e) Pagedown
f) Ctrl+End
g) End
h) Ctrl+Home
23. A Star topology uses hubs and twisted pair wire
True
False
24. The auto shapes tool provides you with
i) Any shape you want to add on a slide
j) Commonly found shape
k) Fancy text to place on your slide
l) Clip art that is related to your presentation
8. 25. Core of linux operating system is
a) Terminal
b) Commands
c) Kernel
d) Shell
26. CRAY is a super computer
False
True
27. A Star topology uses hubs and twisted pair wire
True
False
28. What is the shortcut key for page break
e) Ctrl+Enter
f) Alt+Enter
g) Alt+Ctrl+Enter
h) Ctrl+Shift
29. What is WPA
i) Wifi process access
j) Wired process access
k) Wired protected access
l) Wifi protected access
9. 30. When the mail server sends mail to other mail servers it becomes ____________
a) SMTP server
b) SMTP client
c) Peer
d) Master
31. If you have to send multimedia data over SMTP it has to be encoded into _______
a) Binary
b) Signal
c) ASCII
d) Hash
32. Expansion of SMTP is ________
a) Simple Mail Transfer Protocol
b) Simple Message Transfer Protocol
c) Simple Mail Transmission Protocol
d) Simple Message Transmission Protocol
33. The underlying Transport layer protocol used by SMTP is ________
a) TCP
b) UDP
c) Either TCP or UDP
d) IMAP
10. 34. How to run a process in the background?
a) &
b) *
c) ?
d) |
35. Which command can be executed by a user who is already logged into the system, in
order to change to the root user? (type the command without any parameters)
a) su
b) root
c) chroot
d) user
36. Process information in the current shell can be obtained by using
a) kill
b) bg
c) fg
d) ps
37. .The Umang app is developed by
a) Meity and NeGD
b) Ministry of Defence
c) Ministry of IT
d) Ministry of Finance
11. 38. Cvigil is an app by
a) Customs
b) Election Commission
c) Vigilance
d) Police
39. Receiving money from the UPI sytem is called?
e) Received
f) Pull
g) Null
h) Full
40. Which of the following produces best quality graphics?
i) Laser Printer
j) Plotter
k) Ink Jet Printer
l) Dot Matrix Printer
41. The piece of hardware that converts computer’s digital signal that can travel over
telephone lines is called a___
m) Tower
n) Red wire
o) Bridge
p) Modem
12. 42. Cvigil is an app by
a) Customs
b) Election Commission
c) Vigilance
d) Police
43. Receiving money from the UPI sytem is called?
e) Received
f) Pull
g) Null
h) Full
44. Which of the following produces best quality graphics?
i) Laser Printer
j) Plotter
k) Ink Jet Printer
l) Dot Matrix Printer
45. The piece of hardware that converts computer’s digital signal that can travel over
telephone lines is called a___
m) Tower
n) Red wire
o) Bridge
p) Modem