Professional Documents
Culture Documents
ca pyq
ca pyq
ca pyq
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 1
.
S. No Topics Page No
1. Which of the following memory speed is fast? number 8 at the base, like 512 8 , 56 8 , etc.
a) RAM
b) ROM 3. Which one of the following is a Universal
c) HDD gate?
d) SDD a) AND
e) All the above b) OR
Ans: A c) NAND
d) NOT
2. What is the base of an Octal number? e) XOR
a) 8 Ans: C
b) 2 NAND and NOR gates are universal gates.
c) 10
d) 16 4. Which of the following shortcut keys is used
e) 6 to justify the text in MS Word?
Ans: A a) Ctrl+ D
A number system with base 8 is called an octal b) Ctrl+ E
number system. The position of every digit has a c) Ctrl+ H
value which is a power of 8. A number in the d) Ctrl+ J
octal number system is represented with the e) Ctrl+ Z
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 2
.
Ans: D Ans: B
You can use the keyboard shortcut, Ctrl + J to Excel has a unique button called “Merge
justify your text. &Center,” which is used to merge two or more
different cells.
5. The IP address 25.6.64.68 belongs to which
class? 8. What is the shortcut key for help in MS Word?
a) Class A a) F5
b) Class B b) F10
c)Class C c) F1
d)Class D d) F2
e)Class E e) F11
Ans: A Ans: C
Shortcut key F1 to enable the Help window in
6. What is the shortcut key for the slide show MS word.
from first slide?
a)F5 9. Disk Defragmentation, also known as
b) Shift + F5 defragging or defrag, is the process of
c) Alt + F5 rearranging the data on a storage medium, such
d) F10 as a hard disk drive (HDD), for efficient storage
e) Ctrl+ F5 and access. This is an example of which type of
Ans: a software?
Keyboard Shortcut Function F5 Start a slide a) System Software
presentation from the beginning b) Application software
c) Utility software
7. What is the purpose of the Merge and Centre d) Both a and b
feature in MS- Excel? e) Both a and c
a) It joins two words from two cells Ans: C
b) It combines two cells into one cell DiskDefragmentation, also known as defragging
c) It adds numeric values from two cells or defrag, is the process of rearranging the data
d) It calculates the total of a range of cells on a storage medium, such as a hard disk drive
e) Other than the given options (HDD), for efficient storage and access.This is
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 3
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 4
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 5
.
Ans: A c) Shift+F8
Shift+F6 switches between the worksheet, d) Ctrl+Shift+F4
Zoom controls, task pane, and ribbon. Ctrl+F6 e) F8
switches to the next workbook window when Ans: B
more than one workbook window is open. If the Developer tab is not added to your Excel
ribbon, press Alt + F8 to open the Macro dialog.
20. In which tab is the citation available in
Excel? 23. Which of the following software is
a) Home substituted for hardware and stored in ROM?
b) Insert a) Middleware
c) Reference b) Firmware
d) Data c) Package Software
e) Table format d) Application Software
Ans: C e) Synchronous Software
Ans: B
21. Which of the following tools is used for Firmware is a software program or set of
preventing copyright in Ms-Word? instructions programmed on a hardware device.
a) Watermark It is typically stored in the flash ROM of a
b) Tab hardware device.
c) Optimisation
d) SE 24. What is the full form of GIF?
e)None of the above a)Graphics Interchange Format
Ans: A b) Geological Information Format
Watermarks can be used to protect confidential c) Geography Information Form
information, copyrightprevention and to indicate d) Graphics Information Format
the validity of a legal document. e) Get Information Format
Ans: A
22. What is the shortcut key for Macro in MS- The full form of GIF is Graphics Interchange
Excel? Format.The Graphics Interchange Format is a
a) Ctrl+ F5 bitmap image format that was developed by a
b) Alt+ F8 team at the online services provider
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 6
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 7
.
Break” from the Pages group. 30. Which of the following is not a computer
language?
29. Which of the following is correct ? a)Unix
a) 1 MB =1024 bits b) Java
b) 1TB = 1024 KB c) C++
c) 1 GB = 1024 MB d) COBAL
d) 1 Byte = 8 KB e) HTML
e) All the above is correct Ans: A
Ans: C UNIX is an Operating system while all others are
1 MB = 1024 KB computer languages
1TB = 1024 GB
1 GB= 1024 MB
1 KB = 1024 Bytes
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 8
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 9
.
Ans: A a) Clipboard
Grammatical & Misspelling b) Font
c) Chart
9. Spelling, Grammar and Thesaurus are found d) Alignment
under which tab in MS Word 2019? e) Workbook Views
a) Home Ans: C
b) Review The chart option is available under the Insert
c) Reference tab. The rest are available in Home and View
d) View tabs.
e) Edit
Ans: B 12. Reverse Proxy protects the Server from
______
10. A/an ______ is an electronic signal that is a) External attacks like VIRUS, WORM,
generated from an external hardware device RANSOMWARE
indicating it needs special attention from the b) Hardware failures
OS? c) Software failures
a) Trigger Signal d) External natural disasters
b) Query e) None of these
c) Short signalling Ans: A
d) Interrupt Reverse Proxy protects the server from external
e) trap threats like Virus, Worm and ransomware.
Ans: D Reverse proxies are typically implemented to
An interrupt is a signal emitted by a device help increase security, performance, and
attached to a computer or from a program within reliability.
the computer. It requires the operating system
(OS) to stop and figure out what to do next. An 13. An application of Computer science used to
interrupt temporarily stops or terminates a provide data about biological systems is called?
service or a current process. a) Biosphere
b) Biotechnology
11. The Insert tab has which of the following c) Bioinformatics
options available in MS Excel? d) Bioengineering
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 10
.
e) Biogeotechnology
Ans: C 16. Which email protocol is used to send
Bioinformatics. Bioinformatics is defined as the /forward messages and which protocol is used
application of tools of computation and analysis for receiving messages respectively?
to the capture and interpretation of biological a) SMTP & POP3
data. b) POP3 and PING
c) POP3 and SMTP
14. What does FDISK do? d) FTP & IMAP
a) performs low-level formatting of the hard drive e) None of these
b) fixes bad sectors on the hard drive Ans: A
c) recovers lost clusters on the hard drive SMTP & POP3. POP3 is used for receiving and
d) creates partitions on the hard drive SMTP is used for transmitting or sending
e) None of these messages. MIME is used for attaching files.
Ans: D
It creates partitions on the hard drive 17. In MS- PowerPoint, by default there are how
many placeholders in the slides?
15. A computer program that automatically a) 1
searches web pages based on certain keywords b) 2
is called? c) 3
a) Web Data Store d) 4
b) Web Play Store e) 5
c) Browser Ans: B
d) Search Engine One for title and the other for text. There are
e) Web Crawler two types of placeholders that appear on slides.
Ans: E The Single object placeholder is used to insert a
A web crawler, crawler or web spider, is a specific object and the multiple object
computer program that's used to search and placeholders can be used to insert a range of
automatically index website content and other different objects.
information over the internet. These programs,
or bots, are most commonly used to create 18. The 3rd Generation computer is ____
entries for a search engine index a) UNIVAC
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 11
.
b) PASCAL
c) PDP 11 21. Which of the following are the applications of
d) Honeywell 6000 an Operating System?
e) EDBIC a) File Management
Ans: D b) Context Switching
c) Both a & b
19. Among the following identify the OS that is d) Managing network packets
the fastest e) None of these
a) Real time OS Ans: C
b) Distributed OS An OS does both Context Switching and
c) Time Sharing OS Managing the File System
d) Homogenous OS 22. Which command displays directories as well
e) None of these as subdirectories also in MSDOS?
Ans: B a) DIR/All
Distributed OS. Among these Distributed OS is b) DIR/AN
the fastest. c) DIR/DS
d) DIR/S
20. Select the correct algorithm used for paging e) None of these
in memory management Ans: D
a) Belady’s Anomaly The dir command displays a list of files and
b) Travelling Salesman subdirectories in a directory. With the /S option,
c) FCFS it recurses (execute a procedure recursively)
d) Page Replacement subdirectories and lists their contents as well.
e) Round Robin
Ans: D 23. Full form of CMOS is
Page replacement happens when a requested a) Complimentary Metal-Oxide Semiconductor
page is not in memory (page fault) and a free b) Coupling Metal-Oxide Semiconductor
page cannot be used to satisfy the allocation, c) Complimentary Metal-Oxide System
either because there are none, or because the d) Converting Metal-Oxide Semiconductor
number of free pages is lower than some e) ComplimentaryMetal-Operating
threshold. Semiconductor
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 12
.
24. The very first high-level language introduced 27. A software which is freely available to
in computer was ______________. download but the source code in it can’t be
a) C modified or changed is called __?
b) PASCAL a) Open Source
c) JAVA b) Closed Source
d) COBOL c) GITHUB
e) None of these d) Freeware
Ans: E e) Malware
The first HLL introduced was FORTRAN Ans: D
(Formula Translation) Unlike with free and open-source software,
which are also often distributed free of charge,
25. In a super type/subtype hierarchy, each the source code for freeware is typically not
subtype has? made available.
a) Only one super type
b) Many super types 28. Category 6 or CAT6 Ethernet cable colour
c) At most two super types standards are Red, Blue, Yellow, White, Grey
d) At least one subtype and Black. What does the Bluecolour identify?
e) Not at all a) VOIP connection
Ans: A b) Network Connectivity
In a super type/sub-type hierarchy, each sub- c) Equipment in workstation
type has only one super type d) Jumpers
e) Receivers
26. Consider the URL given“www.XYZ.com” Ans: B
What does the “.com” represent. Network Connectivity. The Blue coloured cable
a) Communication denotes Network Connectivity.
b) Commercial
c) Committee 29. TCP port number 443 is used by __
d) Company a) TELNET
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 13
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 14
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 15
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 16
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 17
.
prevents ___________________
8. Which of the following forms of transmission a) Access to internetwork files
occurs during walkie-talkie communication? b) Access to intranetwork files
a) Simplex c) Access to files from public IP addresses
b) Full —Duplex d) Access to logic bomb files
c) Half-Duplex e) Unauthorized access to a network
d) Online Ans: E
e) None of these A firewall is essential software or firmware in
Ans: C network security that is used to prevent
In half-duplex mode, both the transmitter and unauthorized access to a network. It inspects
receiver transmit and receive, but not at the incoming and outgoing traffic using a set of
same time. When one of them is sending, the security rules to identify and block threats.
other can only receive, and vice versa. Example:
Walkie-talkie in which message is sent one at a 11. The BIOS settings are stored in the
time and messages are sent in both directions. ____________ chip which is kept powered up via
the battery on the motherboard
9. In which type of disc the data can be written a) EPROM
only once and cannot be erased? b) UEFI
a) CD-RW/DVD-RW c) PMOS
b) BD-R d) CMOS
c) DVD-ROM/CD-ROM e) None of these
d) HD-DVD Ans: D
e) CD-R/DVD-R BIOS, or Basic Input/Output System, is software
Ans: E stored on a small memory chip, also known as
With CD-R discs, you can only write to them firmware. BIOS is found on the motherboard,
once, but you can read from them repeatedly. and it is the very first software to run after a
You can write to CD-RW discs numerous times computer starts. Generally, the terms BIOS and
and read content from them an infinite number CMOS are used interchangeably. A BIOS chip
of times. in a motherboard contains the program
(firmware commonly called BIOS) to boot the
10. A firewall is software or firmware that computer. A CMOS chip stores the settings like
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 18
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 19
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 20
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 21
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 22
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 23
.
010 111 010. Grouping them into three’s. 2 7 Laser printers, Inkjet printers and Thermal
2 printers are some examples of Non-Impact
printers.
36. When a user try to access a resource on a
web server (usually a web page) that doesn't 38. Which of the following keyboard key is used
exist, which type of Error exist that time? in a Microsoft PowerPoint presentation to select
a) HTTP Error 505 one hyperlink after another during a slide
b) HTTP Error 302 presentation?
c) HTTP Error 405 a) Shift+O
d) HTTP Error 403 b) Ctrl+P
e) HTTP Error 404 c) Alt+H
Ans: E d) F1
The Web server returns the HTTP 404 - File not e) Tab
found error message when it cannot retrieve the Ans: E
page that was requested. The following are
some common causes of this error message: 39. Flash memory is a non-volatile computer
The requested file has been renamed. The storage chip made up of __________________.
requested file has been moved to another a) DROM
location and/or deleted. b) MROM
c) PROM
37. Inkjet printers and laser printers are d) EPROM
examples of ____ printers. e) EEPROM
a) Impact Printers Ans: E
b) Semi-impact Printers EEPROM is the acronym of electrically erasable
c) Hashed out Printers programmable read-only memory, EEPROM is a
d) Priority Printers Programmable ROM that can be erased and
e) Non-Impact reprogrammed using an electrical charge. It was
Ans: E first was developed by George Perlegos. It
Non-impact printers create pictures, characters, allows the user to update the computer BIOS
and figures without any uninterrupted contact without having to open the computer or remove
between the printing device and the paper. any chips.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 24
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 25
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 26
.
12. The Hard disk and the CD-ROM are 15. In MS — Excel, Insert Function are located
connected at the? on the__
a) BT Attachment a) Vertical scroll bar
b) SATA Attachment b) Horizontal scroll bar
c) AT Attachment c) Formula bar
d) IDC Attachment d) Standard toolbar
e) None of these e) None of these
Ans: C Ans: D
AT Attachment stands for advanced technology The standard toolbar contains the Insert
attachment, it is an interface that connects hard functions
drives, CD-ROM drives, and other drives.
16. MAC address is used for
13. Technique/ Technology used in hiding or de- a) Identifying the physical address of a device
routing the IP address is _______. on the same local network
a) Spoofing b) Identifying the logical address of a device on
b) OSPF routing the same local network
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 27
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 28
.
d) Mozilla 2003.
e) None of these
Ans: D 25. Mobile OS is a type of?
a) Real Time OS
22. A Discrete signal is also known as ______ b) Embedded OS
a) Digital Signal c) Multiuser OS
b) Analog Signal d) Branched OS
c) Fourier Signal e) None of these
d) None of these Ans: B
e) All of the above An embedded operating system is a specialized
Ans: A operating system (OS) designed to perform a
specific task for a device that is not a computer.
23. How can the slide show be repeated The main job of an embedded OS is to run the
continuously in MS-PPT? code that allows the device to do its job
a) loop continuously until ‘Esc’
b) repeat continuously 26. The correct steps to convert the MS Word
c) loop more doc file to PDF is _____
d) One by one a) Click on Save as > Type PDF
e) None b) Rename file with .pdf extension
Ans: A c) Rename file with PDF words in the name
d) All are valid
24. The oldest version of Windows from the e) None of these
following is? Ans: A
a) Windows Server 2003
b) Windows XP 27. Computers connected to a LAN can__
c) Windows 8 a) Run faster
d) Windows 7 b) Go on line
e) Windows 10 c) Share information and/or share peripheral
Ans: B equipment
Windows XP was introduced in the year 2001 d) E-mail
whereas Windows server was introduced in e) None of these
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 29
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 30
.
plugs into a computer’s USB port and functions Sequential Access is the ability to read or write
as a portable hard drive. each piece of information in a storage device in
a) CD-ROM approximately the same length of time
b) Flash drive regardless of its location
c) DVD-ROM
d) CD-RW 36. If a disk drive fails but the computer
e) All of these application running and using it can continue
Ans: B processing this application is said to have been
Flash driveis a small, portable flash memory designed with this feature.
card that plugs into a computer’s USB port and a) 100 percent uptime
functions as a portable hard drive b) Fault tolerance
c) High reliability
34. What kind of memory is both static and non- d) All of the above
volatile? e) None of these
a) BIOS Ans: B
b) CACHE If a disk drive fails but the computer application
c) RAM running and using it can continue processing
d) ROM this application is said to have been designed
e) All of the above with fault tolerance
Ans: D
37. Protecting data by copying it from the
35. The ability to read or write each piece of original source to a different destination is called
information in a storage device in approximately a) Formatting
the same length of timeregardless of its location b) Hacking
is__ c) Backup
a) Sequential Access d) Data diddling
b) Random Access e) None of these
c) Registerscan Ans: C
d) Linear Search
e) None of these 38. Cloud Storage can be defined as a virtual
Ans: A memory unit that allows users to create, update,
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 31
.
Click Here For Bundle PDF Course Click Here to Subscribe Our Yearly Mock Test Package
If there are any suggestions/ errors in this PDF contact us via this email: support@guidely.in 32