0% found this document useful (0 votes)
75 views

Download UGC NET ICT Questions with Solutions PDF_7199

The document contains a series of multiple-choice questions related to Information and Communication Technology (ICT) concepts, including file formats, email features, peripheral devices, data transfer rates, and more. Each question provides options for answers, requiring the reader to select the correct one based on their knowledge of ICT. The questions cover a wide range of topics, including software, networking, data management, and computer hardware.

Uploaded by

akhilaboddu61
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views

Download UGC NET ICT Questions with Solutions PDF_7199

The document contains a series of multiple-choice questions related to Information and Communication Technology (ICT) concepts, including file formats, email features, peripheral devices, data transfer rates, and more. Each question provides options for answers, requiring the reader to select the correct one based on their knowledge of ICT. The questions cover a wide range of topics, including software, networking, data management, and computer hardware.

Uploaded by

akhilaboddu61
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

UGC NET ICT Question Answers with Solution

Q1. Which of the following formats contain exclusively the sound file format appropriate for web distribution?
(A) AVI
(B) AIF
(C) MIDI
(D) MP4
(E) MP3
Choose the correct answer from the options given below:
(a) (A), (C) and (E) only
(b) (B), (C) and (D) only
(c) (C), (D) and (E) only
(d) (B), (C) and (E) only

Q2. Which of the following statements about email are true?


(A) You can add signatures to your emails to give personal contact details.
(B) Email stands for electrical mail.
(C) BCC stands for Blind Carbon Copy.
(D) Using the CC (Carbon Copy) feature of email will hide all other recipients from each other.
Choose the correct answer from the options given below:
(a) (A) and (D) only
(b) (A) and (B) only
(c) (A) and (C) only
(d) (C) and (D) only

Q3. Suman uses her computer to edit a photograph. Which one of these is a peripheral device that could be used to
edit a photograph?
(a) Memory card
(b) Mouse
(c) Printer
(d) USB port

Q4. Identify the correct order of the following data transfer rates measured in bits per second (bps) ranked from
smallest to largest:
(A) 1500 Kbps
(B) 1500 Mbps
(C) 1 Mbps
(D) 1 Gbps
Choose the correct answer from the options given below:
(a) (C), (A), (B), (D)
(b) (A), (C), (D), (B)
(c) (C), (D), (A), (B)
(d) (C), (A), (D), (B)

1 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q5. Which of the following statements are true?
(A) Internet of Things (IoT) wearables are useful for workers employed in hazards conditions.
(B) SMTP stands for Simple Mail Transfer Policy.
(C) IoT wearables enable people to better understand their own health and allow physicians to remotely monitor
them.
(D) RAM is non-volatile memory.
Choose the correct answer from the options given below:
(a) (A) and (C) only
(b) (B) and (D) only
(c) (A) and (B) only
(d) (C) and (D) only

Q6. Which software among the following is used as a reference management tool?
(a) Zotero
(b) Google Jamboard
(c) AUTOCAD
(d) Microsoft Teams

Q7. The image, sound and video data can be created in a number of file formats. In this context, which of the following
are compressed file formats?
(A) JPEG
(B) MP3
(C) MIDI
(D) AVI
(E) MP4
Choose the correct answer from the options given below:
(a) (A), (B) and (E) only
(b) (C), (D) and (E) only
(c) (B), (C) and (D) only
(d) (A) and (E) only

Q8. Match List I with List II

Choose the correct answer from the options given below:


match the column.

2 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


(a) (A)-(IV), (B)-(III), (C)-(I), (D)-(II)
(b) (А)-(III), (B)-(IV), (C)-(I), (D)-(II)
(c) (A)-(II), (B)-(IV), (C)-(I), (D)-(III)
(d) (А)-(III), (B)-(IV), (C)-(II), (D)-(I)

Q9. Which of the following peripheral devices are considered as only input devices?
(A) Microphone
(B) Projector
(C) Joy Stick
(D) Scanner
(E) Track-ball
Choose the correct answer from the options given below:
(a) A, C, D and E only
(b) A, B, D and E only
(c) B, C, D and E only
(d) A, B, C and D only

Q10. With respect to the Computers, what is the purpose of compressing a data file?
(a) To encrypt the data
(b) To occupy less storage space
(c) To increase transmission time over a network
(d) To allow the file to be read by a variety of applications

Q11. Which type of virus or destructive software could appear to be useful, but will actually cause damage once
installed or run by a user?
(a) Hoax
(b) Worm
(c) Trojan Horse
(d) System Sector

Q12. A Company's word-processed daily report contains a graph from a spreadsheet. The report needs to display the
most recent information from the spreadsheet. What feature should be used to insert the most up-to-date graph?
(a) Copy and paste
(b) Mail merge wizard
(c) Automated importing
(d) Linking and embedding

Q13. Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R.
Assertion A: Static RAM is typically used for PC's main memory while Dynamic RAM is used for CPU cache.
Reason R: Static RAM is faster and more expensive than Dynamic RAM.
In light of the above statements, choose the correct answer from the options given below
(a) Both A and R are true and R is the correct explanation of A
(b) Both A and R are true but R is NOT the correct explanation of A
(c) A is true but R is false
(d) A is false but R is true

3 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q14. If you have a storage device with a capacity of 16 gigabytes, then how many 2 kilobytes files can you fit in that
device? (1KB = 1024 bytes)

(a)

(b)

(c)

(d)

Q15. Given below is a typical URL that identifies a web page: https://book.com/author/index.html
The hostname 'book.com' is converted into an IP address by a ____________ server that has a database of matching
names and addresses and is queried for the address.
https://book.com/author/index.html
(a) SMTP
(b) FTP
(c) DNS
(d) HTTP

Q16. Identify the correct order of the following developments (A-E) in the history of computing from the oldest to
the more recent:
(A) Facebook
(B) Internet
(C) Calculator Machine
(D) Computer mouse
(E) Programming language
Choose the correct answer from the options given below
(a) A, B, C, D, E
(b) C, B, E, A, D
(c) C, D, B, E, A
(d) C, E, D, B, A

Q17. Given below are two statements, one is labelled as Assertion A and the other is labelled as Reason R.
Assertion A : Free WiFi access to every citizen is one of the objectives of the 'Digital India' programme of the
Government of India.
Reason R : ICT is a powerful enabler of a digitally empowered society.
In light of the above statements, choose the correct answer from the options given below
(a) Both A and R are true and R is the correct explanation of A
(b) Both A and R are true but R is NOT the correct explanation of A
(c) A is true but R is false
(d) A is false but R is true

Q18. Given below are two statements.


Statement I: In computer networking, the purpose of changing the IP addressing scheme between IPv4 and IPv6 is
to allow for more IP addresses.
4 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
Statement II: A web cookie is stored on the server machine.
In light of the above statements, choose the correct answer from the options given below
(a) Both Statement I and Statement II are true
(b) Both Statement I and Statement II are false
(c) Statement I is true but Statement II is false
(d) Statement I is false but Statement II is true

Q19. Which of the following is a way to quickly access a favourite website by saving it in your browser?
(a) Cookie
(b) Bookmark
(c) Blog
(d) Wiki

Q20. Which of the following statements are correct regarding the Centre for Development of Advanced Computing
(C-DAC) of India?
(A) The setting up of C-DAC was to build Supercomputers in the context of denial of import of Supercomputers by
the USA.
(B) C-DAC started building Indian Language Computing Solutions with the setting up of the GIST group (Graphics
and Intelligence based Script Technology).
(C) This Centre was started in the year 1995.
Choose the correct answer from the options given below:
(a) A and B Only
(b) B and C Only
(c) A and C Only
(d) A. B and C

Q21. What is e-Taal?


(a) A Web portal for dissemination of bank transaction statistics of Panchayat level e- Governance projects.
(b) A mobile app for dissemination of information on fund allocation for National and state level e-Governance
projects.
(c) A Web portal for dissemination of e-Transaction statistics of National and State level e-Governance Projects.
(d) A web-based Software for composing a music.

Q22. Which of the following can be considered as illegal or unethical in the context of information technology?
(A) A hospital reveals the clinical history of a patient without the consent of a patient.
(B) A student using proprietary software without having a license.
(C) A person stealing another person's credit card number.
(D) A college using Linux operating system (being an open-source software) on all its 200 computers on the campus.
Choose the correct answer from the options given below:
(a) A and B Only
(b) B and C Only
(c) A, B and C Only
(d) C and D Only

5 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q23. Given below are two statements:
Statement I: A block-chain is a growing list of records, called blocks, which are linked using Cryptography.
Statement II: Block-chains which are readable by the public are widely used by crypto currencies.
In the light of the above statements, choose the correct answer from the options given below:
(a) Both Statement I and Statement II are true
(b) Both Statement I and Statement II are false
(c) Statement I is true but Statement II is false
(d) Statement I is false but Statement II is true

Q24. Which of the following best describes a computer worm?


(a) Malware that does not replicate itself but spreads through social engineering.
(b) Malware that replicates by attaching itself to a word processing document.
(c) Malware that replicates by attaching itself to an executable programme.
(d) Malware that replicates itself as stand alone software.

Q25. Which IT project in India is the main provider of ICT infrastructure for creating a knowledge society with the
aim to ushering in a knowledge revolution in the country?
(a) NKN
(b) UIDAI
(c) National Informatics Network
(d) Megh Raj (GI Cloud)

Q26. Consider the following spreadsheet:

If the formula = $A3 + B2 in cell C4 is copied to cell C5, then what is the value in cell C5?
(a) 9
(b) 8
(c) 17
(d) 16

Q27. Amar's college uses a form to collect data from new students. The data is used to create information that can
be used by the college. Which of the following statements are true about information?
(A) Information is raw facts and figures that have not been given a meaning.
(B) Information can be produced by processing raw data.
(C) Information is automatically encrypted when it is produced.
(D) Information is raw facts and figures that have been given a context.
Choose the correct answer from the options given below:

6 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


(a) A and C Only
(b) A and B Only
(c) B and D Only
(d) C and D Only

Q28. Identify the correct ascending order of the following numbers under A-D represented in different bases:
(A) (11101011)₂ (Base-2 binary number)
(B) (564)₈ (Base-8 Octal number)
(C) (614)₁₀ (Base 10 decimal number)
(D) (489)₁₆ (Base 16 hexadecimal number)
Choose the correct answer from the options given below:
(a) A, C, D, В
(b) D, C, B, A
(c) B, C, A, D
(d) A, B, C, D

Q29. Given below are two statements: One is labelled as Assertion A and the other is labelled as Reason R.
Assertion (A): E-Governance is important for good governance in Higher Educational Institutions.
Reasons (R): E-Governance is responsive, transparent and subjective.
In the light of the above statements, choose the correct answer from the options given below:
(a) Both (A) and (R) are true and (R) is the correct explanation of (A)
(b) Both (A) and (R) are true but (R) is NOT the correct explanation of (A)
(c) (A) is true but (R) is false
(d) (A) is false but (R) is true

Q30. Which of the following would most likely be considered unacceptable use of information by a teacher?
(a) Using the school district's database to determine gender distribution in local schools.
(b) Using the Internet history on a Classroom computer to audit student Internet use.
(c) Using student's personal data to create a mailing list for a local charity.
(d) Using classroom records to determine recipients of academic awards.

Q31. Given below are two statements:


Statement I: PARAM-Shivay' supercomputer was built under the National Super Computing Mission at IIT-BHU.
Statement II: PARAM-Shivay supercomputer is of 833 teraflop Capacity.
In the light of the above statements, choose the correct answer from the options given below:
(a) Both Statement I and Statement II are true
(b) Both Statement I and Statement II are false
(c) Statement I is true but Statement II is false
(d) Statement I is false but Statement II is true

Q32. Which of the following is/are not example(s) of Cloud Service?


(A) Google Drive
(B) MeghRaj
(C) Dropbox
(D) Windows Explorer
7 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
Choose the correct answer from the options given below:
(a) B Only
(b) D Only
(c) C and D Only
(d) A, B and D Only

Q33. Match List I with List II:

Choose the correct answer from the options given below:


Match the columns.
(a) (A)-(II), (B)-(I), (C)-(IV), (D)-(III)
(b) (А)-(II), (B)-(IV), (C)-(I), (D)-(III)
(c) (A)-(I), (B)-(II), (C)-(IV), (D)-(III)
(d) (А)-(III), (B)-(I), (C)-(IV), (D)-(II)

Q34. Which initiative of the Indian Government aims to provide IT connectivity to all 2,50,000 Gram Panchayats in
the Country?
(a) Bharat Net
(b) NICNET
(c) MeghRaj (GI Cloud)
(d) e-Taal

Q35. Identify the correct order of some of the words A-E given below to complete the following paragraph which
explains the role carried out by different parts of the CPU.
Part of the CPU that (i) holds programs and data currently in use is called _________________(ii); performs calculation
and logical operations is called _________________ and (iii); tells input and output devices how to carry out instructions
is called ______________________
(A) Control Unit
(B) ASCII
(C) Immediate Access Store
(D) ALU
(E) SSD
Choose the correct answer from the options given below:
(a) (D), (A), (B)
(b) (C), (D), (A)
(c) (C), (E), (A)
(d) (B), (D), (E)

8 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q36. What is the sum of the binary (base 2) number (1100)₂, and the hexadecimal (base 16) number (3)₁₆?
(a)
(b)
(c)
(d)

Q37. Match List - I with List - II.

Choose the correct answer from the options given below:


(a) (А)-(ІІІ), (В)-(IV), (C)-(I), (D)-(II)
(b) (A)-(I), (B)-(IV), (C)-(III), (D)-(II)
(c) (А)-(II), (В)-(I), (C)-(IV), (D)-(III)
(d) (A)-(III), (B)-(I), (C)-(IV), (D)-(II)

Q38. Consider the URL: https://example.org/index.html. Which of the following are contained in the URL?
(A) Browser name
(B) File name
(C) Host name
(D) Email address
(E) Protocol
Choose the correct answer from the options given below:
(a) (A), (B) and (C) only
(b) (A), (C) and (E) only
(c) (B), (C) and (E) only
(d) (C), (D) and (E) only

Q39. To record voice narration for your Microsoft PowerPoint presentation, your computer must have:
(A) Sound card
(B) An internet connection
(C) Speakers
(D) An external video port
(E) Microphone
Choose the correct answer from the options given below:

9 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


(a) A, C and E only
(b) B and D only
(c) A and E only
(d) B, C and D only

Q40. In computer networking, an IP version-6 is ___________ times larger than an IP version-4 address.
(a) 2
(b) 4
(c) 6
(d) 8

Q41. Match List - I with List - II.

Choose the correct answer from the options given below:


Match the columns.
(a) A-I, B-II, C-III, D-IV
(b) A-III, B-IV, C-II, D-I
(c) A-IV, B-III, C-II, D-I
(d) A-II, B-III, C-IV, D-I

Q42. Identify the correct order of the following major technological changes A-D in the development of computers
based on first to fourth generation of computers:
(A) Transistors
(B) Microprocessor
(C) Vacuum tubes
(D) Integrated circuits
Choose the correct answer from the options given below:
(a) A, C, D, B
(b) B, A, C, D
(c) D, A, C, B
(d) C, A, D, B

Q43. If (𝐿)𝑀 represents a number L in base-M number system, then what will be the value of

10 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


(a)

(b)

(c)

(d)

Q44. In MS-EXCEL, a formula in cell D9 when copied to cell F12 will become:
Choose the correct answer from the options given below:
(a)

(b)
(c)

(d)

Q45. Match the List I with List II

Choose the correct answer from the options given below:


Match the columns.
(a) A-I, B-II, C-IV, D-III
(b) A-III, B-II, C-IV, D-I
(c) A-II, B-III, C-I, D-IV
(d) A-IV, B-III, C-II, D-I

Q46. If (L)M represents a number L in the base-M number system, then which of the following equalities are true?
(A) (512.125)10 (1000000000.001)2
(B) (512.125)10 (1000.1)8
(C) (512.125)10 (200.2)16
(D) (512.125)10 (2000.02)4
Choose the correct answer from the options given below:

11 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


(a) A and B only
(b) A and C only
(c) B, C and D only
(d) A, B and C only

Q47. Indigenous Knowledge and Resource Management System is at best can be considered as-
(a) Mitigation Response
(b) Adaptation Response
(c) Decarbonization Response
(d) Ethical Response

Q48. A web page displays the following information, in which underlined word is a link to another webpage.
For digital devices, the bandwidth is usually expressed in bits per second (bps). For analog devices, the bandwidth is
expressed in Hertz (Hz)
Which method of data organization is being used?
(a) HTML
(b) Hypertext
(c) Storyboard
(d) Data Scheme

Q49. Consider the following snapshot of MS-EXCEL worksheet:

What will be the value of the cell C1 containing the formula = SUMIF (A1:A6,”>100”,B1:B6) in the above worksheet?
(a) 90
(b) 390
(c) 50
(d) 420

Q50. If (L)M represents a number L in base-M number system, then identify the correct descending order of the
following number A-D, when converted to base-10 number system.
(A) (9C)16
(B) (233)8
(C) (313)7
(D) (10011110)2
Choose the correct answer from the options given below:
(a) C, D, B, A
(b) D, C, A, B
(c) B, C, A, D
(d) D, C, B, A

12 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q51. What are the advantages of using Cloud Computing word processing software?
(A) The user does not have to install word processing software on the computer.
(B) The user does not have to allocate space to install software in the hard disk.
(C) Storage space to save the document is provided by the cloud provider. The user can open or edit the document
from any computer which has an Internet facility.
(D) If the user has slow Internal connection, then he/she would not face any problems accessing or downloading
his/her documents.
Choose the correct answer from the options given below:
(a) A and B only
(b) A and C only
(c) B, C and D only
(d) A, B and C only

Q52. In the context of computer networking, what protocol is used to turn names, such as www.abc.edu, into IP
addresses?
(a) HTTP
(b) DNS
(c) SMTP
(d) SSH

Q53. On a laptop/desktop computer, which of the following components (AC) take care of (i) computing, (ii) storing
data temporarily and (iii) storing data permanently in that order?
(A) RAM
(B) Hard Disk Drive
(C) CPU
Choose the correct answer from the options given below:
(a) (C), (B), (A)
(b) (A), (C), (B)
(c) (B), (A), (C)
(d) (C), (A), (B)

Q54. In IPv6, an address is given by eight 16-bit numbers usually written in hexadecimal. For example, here is an IP
address:
3221: IDE5: CA14: AD1F: 1111:1111:1111:1111
How many unique addresses does IPv6 support overall?
(a) 216
(b) 264
(c) 655364
(d) 655368

Q55. In the history of computing, Moore's Law says that the number of Integrated Circuit (IC) chips in a computer
doubles every 2 years, which implies that computers become twice as powerful every 2 years. According to Moore's
Law, 10 years from now, computers will be _____________________ times as powerful as they are now.
(a) 4
(b) 8
(c) 16
(d) 32

13 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q56. Given below are two statements: One is labelled as Assertion A and the other is labelled as Reason R.
Assertion (A): Massive Open Online Courses (MOOC) are fast gaining popularity among students and working
professionals across the world.
Reasons (R): MOOCs help them study at their own convenience and delivery of quality education is location specific.
In the light of the above statements, choose the correct answer from the options given below:
(a) Both (A) and (R) are true and (R) is the correct explanation of
(b) Both (A) and (R) are true but (R) is NOT the correct explanation of (A)
(c) (A) is true but (R) is false
(d) (A) is false but (R) is true

Q57. Match the List - I with List - II.

Choose the correct answer from the options given below:


Match the columns.
(a) A-III, B-IV, C-II, D-I
(b) A-II, B-I, C-IV, D-III
(c) A-IV, B-III, C-II, D-I
(d) A-I, B-IV, C-III, D-II

Q58. A security system used a camera to capture images of each person entering a gift shop. Each image taken
requires 1 MB of storage. If the camera captures an image every § seconds over a 24-hour period, how much storage
is required?
(a) 16.875 GB
(b) 15.250 GB
(c) 12.525 GB
(d) 19.625 GB

Q59. With reference to different number systems, which of the following statements is true?

(a)
(b)
(c)
(d)

Q60. In the context of Bluetooth and Wi-Fi as wireless communication technologies, which of the following
statements are true?
(A) Bluetooth allows for short-range data transfer between electronic devices, whereas Wi-Fi allows electronic
devices to connect to the Internet.
(B) Bluetooth needs a direct line of sight for data transmission, whereas Wi-Fi does not need it.

14 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


(C) Bluetooth limits the number of devices that can connect at any one time, whereas Wi-Fi is open to more devices
and more users.
(D) Bluetooth does not need a direct line of sight for data transmission, whereas Wi-Fi does need it.
Choose the correct answer from the options given below:
(a) A and B only
(b) B and C only
(c) A, C and D only
(d) A and C only

Q61. Which of the following statements about spreadsheet software (MS-EXCEL) are true?
(A) Data in spreadsheets are always correct.
(B) Spreadsheet software cannot draw bar graphs.
(C) Spread sheet software automatically recalculates.
(D) Some cells in a spreadsheet can be locked to prevent a user changing its contents.
Choose the correct answer from the options given below:
(a) A and B only
(b) C and D only
(c) A and C only
(d) B and D only

Q62. In computers, which of the following statements is true?


(a) Data matrix printer is a type of non-impact printer.
(b) Laser printer is a type of impact printer.
(c) The resolution of a laser printer is measured in Megabits per second (Mbps).
(d) Data matrix printers are noisy, low quality and slow in comparison to laser printers.

Q63. Which of the following electronic technologies is the key technology for making the third generation electronic
computer?
(a) Transistor based
(b) Integrated Current (IC) based
(c) Vacuum tube based
(d) Macroprocessor based

Q64. Match the List – I with List – II.

Choose the correct answer from the options given below:


Match the columns.
(a) A-III, B-IV, C-I, D-II
(b) A-II, B-IV, C-I, D-III
(c) A-I, B-II, C-III, D-IV
(d) A-II, B-I C-IV, D-III

15 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q65. Identify the sequence of words A-E that correctly fills the blanks in the following paragraph:
In the context of human-computer interaction, a_____________ is an interface built around visual things and Windows -
11 is an example of an________________ with these visual things.__________ is region of the screen used to display
information._____________ is a small picture that is used to represent folders, software etc., whereas__________ is a list of
options that the user can select from.
(A) OS
(B) Menu
(C) Window
(D) Icon
(E) GUI
Choose the correct answer from the options given below:
(a) E, A, C, B, D
(b) A, E, D, C, B
(c) E, A, C, D, B
(d) B, C, A, E, D

Q66. With reference to the open source software, which of the following statements are correct?
(A) It is a software that is distributed with its source code.
(B) It allows anyone to modify the software to best fit their needs.
(C) It is a software that anyone can use on a trial basis before paying for it.
(D) Linux is an example of open source software.
Choose the correct answer from the options given below:
(a) A, B and D only
(b) A, B, C and D only
(c) A, C and D only
(d) B and C only

Q67. Which of the following would create the most stable computer network with the fastest data transmission?
(a) Use a wireless access point to connect devices
(b) Connect devices wirelessly using mobile phone
(c) Use coaxial cables to connect devices in sequence
(d) Connect devices to a switch using optic fibre cables

Q68. You wish to save the changed version of a document that was originally located on a standard CDROM. What is
the best method to accomplish this?
(a) Read the document from the CD-ROM, modify the document, then save it to the hard disk.
(b) Read the document from the CD-ROM, modify the document, then save it back to the CD-ROM.
(c) Rename the document from the CD-ROM, read and modify the document, then save it to the hard drive.
(d) Copy the document from the CD-ROM to the hard drive, read the document, modify it, and save it back to the CD-
ROM.

Q69. Given below are two statements:


Statement I: 'Spam' is an attempt to acquire sensitive information for malicious reasons, by masquerading as a
trustworthy entity.
Statement II: 'Phishing' is a type of unsolicited bulk email of identical messages sent to numerous recipients.
In light of the above statements, choose the correct answer from the options given below
16 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
(a) Both Statement I and Statement II are true.
(b) Both Statement I and Statement II are false.
(c) Statement I is true but Statement II is false.
(d) Statement I is false but Statement II is true.

Q70. Which of the following peripheral devices are considered as only input devices?
(A) Headphone
(B) Optical Mark Reader (OMR)
(C) Graphic Tablet
(D) Light Pen
(E) Projector
Choose the correct answer from the options given below:
(a) B, C and D only
(b) B, C and E only
(c) A, B and C only
(d) C, D and E only

Q71. A software company requires '1 GB RAM minimum and 2 GB RAM recommended' for its new Operating System
(OS) software. The likely outcome of attempting to install this OS on a computer with 1 GB RAM would be that:
(a) files will fail to save
(b) peripheral devices will fail to work
(c) the OS will fail to install and therefore the computer will not run
(d) the computer will not run at its optimum performance

Q72. Regarding wearable technology, which of the following tasks is/are accomplished by wearable devices?
(A) Providing more security compared to other computing devices.
(B) Sharing of a wearable device's Internet connection with other connected computers.
(C) Assisting hearing impaired persons.
Choose the correct answer from the options given below:
(a) A and B only
(b) B only
(c) B and C only
(d) C only

Q73. A movie requires 16 gigabytes of storage. How long will it take to download this movie, if the download speed
is 64 megabytes per second? (1KB=1024 Bytes)
(a) 64 seconds
(b) 128 seconds
(c) 256 seconds
(d) 512 seconds

Q74. With respect to telecommunications, which of the following forms of communication are synchronous?
(A) Email
(B) Instagram posts
(C) Blogging
(D) Telephone calls
(E) Instant Messaging
17 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
Choose the correct answer from the options given below:
(a) A, B and C only
(b) D and E only
(c) A, B, D and E only
(d) A, B, C, D and E

Q75. Match List - I with List - II.

Choose the correct answer from the options given below:


Match the columns.
(a) A - IV, B - I, C - III, D - II
(b) A - II, B - I, C - IV, D - III
(c) A - III, B - IV, C - I, D - II
(d) A - III, B - I, C - IV, D - II

Q76. Arrange the following computer memory types from the slowest to the fastest speed:
(A) Main memory (RAM)
(B) L2 Cache
(C) Hard Disk
(D) L1 Cache
(E) CDROM
Choose the correct answer from the options given below
(a) E, C, A, B, D
(b) E, C, A, D, B
(c) B, D, A, C, E
(d) C, E, B, A, D

Q77. Consider the following incomplete sentences about printers:


A laser printer is a type of ________ printer. It produces _________ quality printouts and uses ________ to print onto paper.
A _________ printer can produce carbon copies because the print head makes contact with the paper.
Identify the correct order to fill in the blank spaces using words from the list below ( AD )
(A) High
(B) Dot Matrix
(C) Nonimpact
(D) Toner
Choose the correct answer from the options given below
(a) B, A, D, C
(b) C, D, A, B
(c) A, B, C, D
(d) C, A, D, B

18 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q78. Which of the following are web search engines?
(A) DuckDuckGo
(B) Google
(C) Yahoo search
(D) Bing
(E) Pinterest
Choose the correct answer from the options given below:
(a) B, C and D only
(b) A, B, C and D only
(c) B and E only
(d) A, C, D and E only

Q79. Match List - I with List - II.

Choose the correct answer from the options given below:


Match the columns.
(a) A-I, B-II, C-III, D-IV
(b) A-II, B-IV, C-I, D-III
(c) A-III, BIV, C-I, D-II
(d) A-II, B-IC-IV, D-III

Q80. Given below are two statements.


Statement I: ROM is temporary memory that can be written to or read from and the contents of the memory can be
changed.
Statement II: RAM is permanent memory that can only be read from and contents of memory cannot be changed.
In light of the above statements, choose the most appropriate answer from the options given below
(a) Both Statement I and Statement II are correct
(b) Both Statement I and Statement II are incorrect
(c) Statement I is correct but Statement II is incorrect
(d) Statement I is incorrect but Statement II is correct

Q81. Mohit has sent an email to Bobby, Danny and Ashok as shown below:

19 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Which of the following statements is correct?
(a) Bobby and Danny are aware that Ashok received the email
(b) Danny is aware that Ashok and Bobby received the email
(c) Ashok is aware that Bobby and Danny received the email
(d) All recipients are aware that the others received the email.

Q82. MIDI is associated with the storage of music files. MIDI is an acronym for ___________.
(a) Musical Interactive Digital Interface
(b) Musical Instructions Device Interpreter
(c) Mask Iterative Display Instarice
(d) Musical Instrument Digital Interface

Q83. Identify the correct arrangement of the following different types of computer networks in the descending order
of their geographic area coverage.
(A) MAN
(B) WAN
(C) LAN
Choose the correct answer from the options given below:
(a) (A), (B), (C)
(b) (B), (C), (A)
(c) (B), (A), (C)
(d) (C), (A), (B)

Q84. Which of the following file formats are appropriate for distributing video files across the internet?
(A) .FLA
(B) .MP3
(C) .WMA
(D) .AIF
(E) AVI
Choose the correct answer from the options given below:
(a) (B) and (C) only
(b) (A) and (E) only
(c) (D) and (E) only
(d) (C) and (D) only

Q85. Match List I with List II.

Choose the correct answer from the options given below:


Match the columns.

20 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


(a) (A)-(I), (B)-(IV), (C)-(II), (D)-(III)
(b) (A)-(II), (B)-(IV), (C)-(I), (D)-(III)
(c) (A)-(II), (B)-(IV), (C)-(III), (D)-(1)
(d) (А)-(ІІІ), (В)-(II), (C)-(I), (D)-(IV)

Q86. Given below are two statements in respect of Computers:


Statement (I): A DVD-ROM is an optical storage media and it can be written many times.
Statement (II): Software is loaded into secondary storage from RAM and is then executed by CPU.
In the light of the above statements. Choose the correct answer from the options given below:
(a) Both Statement (I) and Statement (II) are true.
(b) Both Statement (I) and Statement (II) are false.
(c) Statement (I) is true but Statement (II) is false.
(d) Statement (I) is false but Statement (II) is true.

Q87. A software is termed as an open source software if:


(a) the developer company is open 24 x 7
(b) its source code is available to share, study and modify
(c) it can be downloaded from the Internet
(d) it is available free of cost

Q88. Which of the following is the act of obtaining a password or other confidential information from a person within
an organization by using unauthorized means such as feigning an emergency situation?
(a) Social engineering
(b) Password crack
(c) Trojan horse
(d) Stepping-stone attack

Q89. Given below are two statements with regard to websites:


Statement (I): Twitter' allows users to send small posts known as 'tweets' upto 140 characters in length.
Statement (II) By default, blogs display posts in chronological order on the home page with the earliest post at the
top.
In the light of the above statements, choose the correct answer from the options given below:
(a) Both Statement (I) and Statement (II) are true
(b) Both Statement (I) and Statement (II) are false
(c) Statement (I) is true but Statement (II) is false
(d) Statement (I) is false but Statement (II) is true

Q90. With respect to RAM and ROM, which of the following statements are true?
(A) ROM is Real optical memory.
(B) RAM stores the instructions you are currently working on.
(C) ROM stores the BIOS.
(D) RAM allows the user to read and write data.
(E) Both RAM and ROM lose their data when the power is turned off.
Choose the correct answer from the options given below:
21 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
(a) (A), (D) and (E) only
(b) (B), (C) and (D) only
(c) (A), (B) and (C) only
(d) (C), (D) and (E) only

Q91. Match List - I with List - II.

Choose the correct answer from the options given below:


Match the columns.
(a) (A)-(I), (B)-(III), (C)-(IV), (D)-(II)
(b) (А)-(III), (B)-(I), (C)-(II), (D)-(IV)
(c) (А)-(ІІІ), (В)-(I), (C)-(IV), (D)-(II)
(d) (A)-(IV), (B)-(II), (C)-(I), (D)-(III)

Q92. Arrange the following different types of computer networks in an ascending order on the basis of geographical
area implied.
(A) MAN
(B) WAN
(C) LAN
Choose the correct answer from the options given below:
(a) (C), (B), (A)
(b) (A), (C), (B)
(c) (C), (A), (B)
(d) (B), (A), (C)

Q93. _____________ are text files with small pieces of data and are used to identify specific users and improve the web
browsing experience.
(a) Cookies
(b) Bookmarks
(c) Blogs
(d) Wikis

Q94. Which of the following statements are correct regarding Radio Frequency Identification (RFID) technology?
(A) RFID refers to a wireless system comprising two components: tags and readers.
(B) The reader is a device that has one or more antennas that emit radio waves and receive signals back from the
RFID tag.
(C) Passive RFID tags are powered by the reader and do not have a battery.
Choose the correct answer from the options given below.
(a) A, B and C
(b) B and C only
(c) A and C only
(d) A and B only

22 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Q95. The collection of linked information residing on computers which is accessible through the Internet is called
_______________________.
(a) HTTP
(b) HTML
(c) WWW
(d) URL

Q96. Which of the following hardware components will lose data when the power to a computer is switched off?
(A) Processor Registers
(B) Cache Memory
(C) SSD
(D) RAM
(E) ROM
Choose the correct answer from the options given below:
(a) B and Donly
(b) A, C and D only
(c) A, B and C only
(d) A, B and Donly

Q97. An example of a cyber exacerbated crime is _______________.


(a) Cyber vandalism
(b) Cyber piracy
(c) Cyber stalking
(d) Cyber trespass

Q98. Match List I with List II


List I List II
(Computer Terms) (Description)
(A) OMR (I) Used by banks to read codes on a cheque
(B) MICR (II) prevents unauthorized access to a computer network
(C) RAM (III) Marks multiple-choice questions
(D) Firewall (IV) Stores programs and data temporarily
Choose the correct answer from the options given below:
Match the column.
(a) (А)-(III), (В)-(І), (C)-(II), (D)-(IV)
(b) (A)-(III), (B)-(IV), (C)-(I), (D)-(II)
(c) (А)-(III), (В)-(I), (C)-(IV), (D)-(II)
(d) (А)-(І), (В)-(III), (C)-(IV), (D)-(II)

Q99. Identify the correct arrangement of the following storage capacities in the decreasing order
(A) 10 Mega Bytes
(B) 10 Tera bytes
(C) 10 Exa bytes
(D) 10 Yotta bytes

23 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Choose the correct answer from the options given below:
(a) (D), (C), (B), (A)
(b) (C), (D), (B), (A)
(c) (C), (B), (D), (A)
(d) (B), (C), (D), (A)

Q100. With respect to Computers, BIOS is an acronym for:


(a) Binary Input Output Source
(b) Basic Input Output Support
(c) Binary Input Output System
(d) Basic Input Output System

Solutions
S1. Ans.(d)
Sol. Sound file formats appropriate for web distribution include AIF, MIDI and MP3, which are compact and
optimized for audio streaming.
Information Booster:
1. Web-Optimized Formats:
• AIF: High-quality uncompressed format.
• MIDI: Compact format for instrumental data.
• MP3: Compressed format widely used for music streaming.
2. Excluded Formats: AVI and MP4 are multimedia formats that include video and are unsuitable for web-optimized
audio-only distribution.
Additional Knowledge:
• MP4 and AVI are not exclusively sound file formats.
• MP3 is universally supported for web audio.

S2. Ans.(c)
Sol. Email supports adding signatures for personal contact details, and BCC stands for Blind Carbon Copy. However,
the statement that email stands for "electrical mail" is incorrect, and CC does not hide recipients—it shows them.
Information Booster:
1. Key Features of Email:
• Signatures: Allow users to include personalized information like name, designation, and contact details.
• BCC (Blind Carbon Copy): Sends a copy of the email to hidden recipients.
• CC (Carbon Copy): Shares the email openly with all recipients.
2. Misconception About Email: Email stands for Electronic Mail, not electrical mail.
Additional Knowledge:
• CC exposes all recipients to each other, unlike BCC.
• Email facilitates fast and efficient communication but may lack privacy if used incorrectly.

S3. Ans.(b)
Sol. A mouse is a peripheral device used to interact with and edit photographs, enabling precision in tasks like
cropping or selecting tools in image editing software.

24 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster:
1. Role of a Mouse:
• Acts as a pointing device to control on-screen tools.
• Essential for fine-tuned adjustments in photo editing.
2. Other Peripheral Devices: Scanners for input, printers for output.
Additional Knowledge:
• A memory card stores data but isn’t used for direct editing.
• USB ports facilitate device connectivity, not direct editing.

S4. Ans.(d)
Sol. From smallest to largest, data transfer rates rank as follows:
1. 1 Mbps
2. 1500 Kbps
3. 1 Gbps
4. 1500 Mbps
Information Booster:
1. Conversion Basics:
• 1 Mbps = 1000 Kbps
• 1 Gbps = 1000 Mbps
2. Ranking Data Rates: Compare based on bps values.
Additional Knowledge:
• Kbps is smaller than Mbps, which is smaller than Gbps.
• Conversion errors often lead to misinterpretation in ranking.

S5. Ans.(a)
Sol. IoT wearables are beneficial for monitoring health and hazardous workplaces. However, SMTP stands for Simple
Mail Transfer Protocol, not policy, and RAM is volatile, not non-volatile memory.
Information Booster:
1. IoT Wearables:
• Track health metrics and enable remote monitoring by healthcare professionals.
• Improve safety in hazardous conditions like mining or construction.
2. Volatile vs. Non-Volatile Memory:
• RAM loses data when power is off (volatile).
• Non-volatile memory retains data (e.g., ROM, SSD).
Additional Knowledge:
• SMTP is a standard protocol for email transmission.
• IoT revolutionizes personal health and industrial safety.

S6. Ans.(a)
Sol. Zotero is a popular tool for managing references, citations, and bibliographies in academic and professional
work.
Information Booster:
1. What is Zotero?
• A free and open-source reference management tool.
• Helps users collect, organize, and cite sources.
2. Common Alternatives: EndNote, Mendeley, and RefWorks.
25 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
Additional Knowledge:
• Google Jamboard is a digital whiteboard tool.
• AutoCAD is used for design and drafting.
• Microsoft Teams is a collaboration platform.

S7. Ans.(a)
Sol. The following are compressed file formats:
• JPEG: A compressed image format.
• MP3: A compressed audio format.
• MP4: A compressed video format.
MIDI is not a compressed format but a protocol for musical instruments. AVI is an uncompressed or minimally
compressed video format.
Important Key Points:
1. JPEG, MP3, and MP4 are all commonly used compressed file formats.
2. MIDI is a protocol for audio data, while AVI is often used for uncompressed video.

S8. Ans.(b)
Sol. The correct matches are:
• Linux: An Operating System (III).
• Mozilla Firefox: A Web Browser (IV).
• Notepad: A simple Text File Editor (I).
• JPEG: A compressed image file format (II).
Important Key Points:
1. Linux is a widely used open-source operating system.
2. Mozilla Firefox is a popular web browser.
3. Notepad is a basic text editor used for editing plain text files.
4. JPEG is a widely used image file format.

S9. Ans.(a)
Sol. • Input Devices: Devices that send data to the computer:
• Microphone (A): Captures sound.
• Joystick (C): Controls movement, often in games.
• Scanner (D): Converts physical documents to digital format.
• Trackball (E): A pointing device.
• Projector (B): Not an input device; it is an output device.
Information Booster:
1. Input Devices Examples: Keyboard, mouse, scanner, microphone, and joystick.
2. Output Devices Examples: Monitor, printer, projector, and speakers.
Additional Knowledge:
Some devices (e.g., touchscreens) are both input and output devices.

S10. Ans.(b)
Sol. Compression reduces the file size, allowing it to occupy less storage space and improve transmission efficiency
over networks.
26 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
Information Booster:
1. Advantages of Compression:
• Saves storage space.
• Reduces data transmission time.
• Facilitates faster downloads/uploads.
2. Compression Tools: Examples include ZIP, RAR, and GZIP.
Additional Knowledge:
Option (a): Encryption secures data, not compresses it.
Option (c): Compression decreases, not increases, transmission time.
Option (d): Compatibility with applications depends on the file format, not compression.

S11. Ans.(c)
Sol. A Trojan Horse appears useful or legitimate but causes harm when executed. It often provides unauthorized
access to systems or installs malware.
Information Booster:
1. Types of Malware:
• Worm: Self-replicates and spreads across networks.
• Trojan Horse: Deceptive and requires user execution.
• Hoax: False alarms or misinformation about threats.
2. Characteristics of a Trojan Horse:
• Does not self-replicate.
• Hidden in seemingly useful programs.
Additional Knowledge:
Option (a): Hoaxes are not actual malware.
Option (b): Worms spread independently but are not disguised as useful software.
Option (d): System sector refers to a part of the disk, not malware.

S12. Ans.(d)
Sol. Linking and Embedding: Ensures the graph in the word-processed report is always updated with the latest
data from the spreadsheet.
Information Booster:
1. Linking:
• Maintains a live connection between the document and the source file.
• Updates automatically when the source file changes.
2. Embedding: Inserts a static copy of the source file into the document.
Additional Knowledge:
Option (a): Copy-paste creates a static version, which doesn’t update automatically.
Option (b): Mail merge is used for generating personalized documents, not graphs.
Option (c): Automated importing is not specific to graph updates.

S13. Ans.(d)
Sol. Assertion (A): False. Static RAM (SRAM) is used for CPU cache, while Dynamic RAM (DRAM) is used for a PC's
main memory.
Reason (R): True. SRAM is faster and more expensive than DRAM, making it suitable for cache memory.

27 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster:
1. Static RAM (SRAM):
• Retains data as long as power is supplied.
• Faster and more expensive.
• Used in CPU cache and registers.
2. Dynamic RAM (DRAM):
• Stores data using capacitors that need constant refreshing.
• Slower and cheaper.
• Used in main memory (RAM).
Additional Knowledge:
• SRAM uses flip-flops for storage, while DRAM uses capacitors.
• DRAM is more common in PCs due to its cost efficiency.

S14. Ans.(a)
Sol. 1. Convert storage capacity to bytes:
2. Calculate file size in bytes:
3. Find the number of files:

Information Booster:
1. Byte Hierarchy:
• 1 KB = 1024 bytes
• 1 MB = 1024 KB
• 1 GB = 1024 MB
2. Use Cases: Estimating file storage capacity on devices.
Additional Knowledge:
Approximation techniques can help verify calculations in exams or real-life scenarios.

S15. Ans.(c)
Sol. DNS (Domain Name System): Converts human-readable domain names (e.g., book.com) into machine-readable
IP addresses (e.g., 192.0.2.1).
Information Booster:
1. Role of DNS:
• Acts as the internet's phonebook.
• Resolves domain names into IP addresses.
2. Other Options:
• SMTP: Protocol for sending emails.
• FTP: Protocol for file transfers.
• HTTP: Protocol for transmitting web pages.
Additional Knowledge:
• DNS works through recursive and authoritative servers.
• It uses caching to improve query response times.

28 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S16. Ans.(d)
Sol. Calculator Machine (C): Developed in the early 1600s by Blaise Pascal.
Programming Language (E): Early languages like FORTRAN appeared in the 1950s.
Computer Mouse (D): Invented by Douglas Engelbart in 1964.
Internet (B): Emerged in the late 1960s with ARPANET.
Facebook (A): Launched in 2004.
Information Booster:
Key Milestones:
1. Calculators and basic computing devices paved the way for modern computing.
2. Programming languages formalized instructions for machines.
3. The internet connected the world, while social media revolutionized communication.
Additional Knowledge:
Each development built upon its predecessor, showcasing the evolution of technology over centuries.

S17. Ans.(d)
Sol. Assertion (A): Incorrect. Free Wi-Fi access for every citizen is not explicitly an objective of the "Digital India"
programme.
Reason (R): Correct. ICT (Information and Communication Technology) is indeed a powerful enabler of a digitally
empowered society by promoting accessibility, efficiency, and inclusion.
Information Booster:
1. Digital India Objectives:
• Digital infrastructure as a utility for every citizen.
• Governance and services on demand.
• Digital literacy and empowerment.
2. Role of ICT: Facilitates e-Governance, education, and healthcare through technology.
Additional Knowledge:
Free Wi-Fi is offered in select locations under initiatives like PM-WANI (Wi-Fi Access Network Interface), but it is
not a primary goal of Digital India.

S18. Ans.(c)
Sol. Statement I: True. IPv6 provides a larger address space than IPv4 to accommodate the growing number of
devices. IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses.
Statement II: False. A web cookie is stored on the client machine (browser), not the server.
Information Booster:
1. Why IPv6?
• IPv4 supports about addresses, whereas IPv6 supports addresses.
2. Cookies: Cookies store user data locally to track sessions or preferences.
Additional Knowledge:
• IPv4 is still widely used, but IPv6 adoption is increasing for scalability.
• Cookies enhance user experience but raise privacy concerns.

S19. Ans.(b)
Sol. A bookmark is a browser feature that allows users to save links to their favorite websites for quick and easy
access.

29 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster:
1. Use of Bookmarks:
• Organize frequently visited websites.
• Save time by eliminating the need to search for URLs repeatedly.
2. Cookie vs. Bookmark: A cookie stores session data, not links to websites.
Additional Knowledge:
Option (a): Incorrect, cookies are for storing session-related data.
Option (c): Incorrect, a blog is an online journal.
Option (d): Incorrect, a wiki is a collaborative platform.

S20. Ans.(a)
Sol. (A): Correct. C-DAC was established to develop indigenous supercomputers after the USA denied India access to
supercomputers.
(B): Correct. The GIST (Graphics and Intelligence-based Script Technology) group was formed to work on Indian
language computing solutions.
(C): Incorrect. C-DAC was established in 1988, not 1995.
Information Booster:
1. Role of C-DAC:
• Developed India’s first supercomputer, PARAM, in 1991.
• Works on high-performance computing, Indian language technologies, and AI.
2. Significance of GIST Group: Focuses on developing tools for Indian languages, enabling broader ICT accessibility.
Additional Knowledge:
Option (b): Incorrect because (C) is false.
Option (c): Incorrect because (B) is true.
Option (d): Incorrect, as only (A) and (B) are correct.

S21. Ans.(c)
Sol. e-Taal (Electronic Transaction Aggregation and Analysis Layer): A web portal developed to monitor and
disseminate e-transaction statistics of various National and State-level e-Governance projects. It provides transaction
data to promote transparency and accountability in governance.
Information Booster:
1. Features of e-Taal:
• Tracks real-time transaction data across e-Governance services.
• Enhances accountability and service efficiency.
2. Use Case: Used to analyze how citizens access government services electronically.
Additional Knowledge:
Option (a): Incorrect, as e-Taal focuses on e-transaction data, not bank transactions.
Option (b): Incorrect, as e-Taal is not a mobile app.
Option (d): Incorrect, as e-Taal is unrelated to music composition.

S22. Ans.(c)
Sol. (A): Revealing patient data without consent breaches privacy laws (e.g., GDPR, HIPAA).
(B): Using unlicensed proprietary software violates copyright laws.
(C): Stealing credit card numbers is both illegal and unethical.
(D): Using Linux (open-source software) is legal and ethical.
30 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
Information Booster:
1. Legal vs. Ethical in IT:
• Legal issues deal with compliance with laws.
• Ethical concerns involve principles of fairness and privacy.
2. Examples of Unethical Practices:
• Unauthorized access to personal data.
• Piracy of software or media.
Additional Knowledge:
Option (a): Incorrect, as (C) is also unethical.
Option (b): Incorrect, as (A) is also unethical.
Option (d): Incorrect, as (D) is legal and ethical.

S23. Ans.(a)
Sol. Statement I: True. A blockchain is a list of records (blocks) linked using cryptographic methods, ensuring secure
and tamper-proof data storage.
Statement II: True. Public blockchains (e.g., Bitcoin, Ethereum) are widely used in cryptocurrencies.
Information Booster:
1. Features of Blockchain:
• Distributed ledger technology.
• Tamper-proof and transparent.
2. Applications of Blockchain:
• Cryptocurrencies (e.g., Bitcoin).
• Supply chain management, healthcare, and e-governance.
Additional Knowledge:
• Private vs. Public Blockchains:
• Public blockchains are accessible to anyone (e.g., Bitcoin).
• Private blockchains are restricted to authorized users.

S24. Ans.(d)
Sol. A computer worm is a type of malware that replicates itself without needing to attach to a host program or file.
It spreads autonomously through networks or devices.
Key Characteristics of Worms:
• Standalone software that does not rely on other programs to spread.
• Exploits vulnerabilities in network protocols or operating systems.
Information Booster:
1. Difference Between Worms and Viruses:
• Worms: Self-replicate without requiring a host file or program.
• Viruses: Require a host program or file to spread.
2. Common Examples: Morris Worm, WannaCry.
Additional Knowledge:
Option (a): Incorrect; describes social engineering tactics used by some malware but not worms.
Option (b): Incorrect; describes macro viruses, which attach to documents.
Option (c): Incorrect; describes executable file viruses.

31 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S25. Ans.(a)
Sol. NKN (National Knowledge Network):
• Established to connect institutions across India with high-speed internet to facilitate knowledge sharing, research,
and collaboration.
• Aims to create a knowledge society and support the knowledge revolution.
Information Booster:
Key Features of NKN:
1. High-speed connectivity with gigabit-level bandwidth.
2. Links academic and research institutions, libraries, and healthcare organizations.
Additional Knowledge:
• UIDAI: Manages Aadhaar, unrelated to ICT infrastructure.
• NIC: Focuses on e-governance infrastructure.
• MeghRaj: Government's cloud computing initiative.

S26. Ans.(b)
Sol. 1. Formula Given: = $A3 + B2
• $A3: Refers to column A, row 3 (value = 7).
• B2: Refers to column B, row 2 (value = 2).
2. Cell C4: When the formula is copied to cell C5, the row numbers adjust relatively, but the $A reference remains
absolute (column A):
• $A3 becomes $A4 (value = 8).
• B2 becomes B3 (value = empty or 0).
3. New Formula in C5:
Value in C5 = A4 + B3 = 8 + 0 = 8
Information Booster:
1. Absolute vs. Relative References:
• Absolute ($): Does not change when copied.
• Relative: Adjusts based on the relative position of the cell.
2. Understanding the Spreadsheet: Cell values are crucial for evaluating formulas.

S27. Ans.(c)
Sol. True Statements:
• B: Information is produced by processing raw data.
• D: Information is raw facts and figures given a context.
False Statements:
• A: Raw facts and figures are defined as data, not information.
• C: Information is not automatically encrypted unless specified.
Information Booster:
1. Data vs. Information:
• Data: Unprocessed raw facts and figures.
• Information: Processed and meaningful data.
2. Examples:
• Data: "100, 90, 80"
• Information: "Scores in a class test: 100, 90, 80."

32 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S28. Ans.(d)
Sol. Step 1: Convert all numbers to Base-10 (Decimal)
Convert A :
1. Expand the binary number using powers of 2:

2. Perform the calculations: = 128 + 64 + 32 + 0 + 8 + 0 + 2 + 1 = 235


3. The decimal value of A is 235.
Convert B :
1. Expand the octal number using powers of 8:
2. Perform the calculations:
3. The decimal value of B is 372.
Convert C :
• C is already in Base-10, so no conversion is needed.
• The decimal value of C is 614.
Convert D :
1. Expand the hexadecimal number using powers of 16:
2. Perform the calculations:
3. The decimal value of D is 1161.
Step 2: Arrange the Decimal Values in Ascending Order
The converted decimal values are:
• A = 235
• B = 372
• C = 614
• D = 1161
Arrange these in ascending order:
235 (A), 372 (B), 614 (C), 1161 (D)

S29. Ans.(c)
Sol. Assertion (A): E-Governance enhances good governance by improving efficiency, transparency, and
accountability in Higher Educational Institutions.
Reason (R): While E-Governance is indeed responsive and transparent, it is not subjective; it is designed to reduce
subjectivity by making decisions based on predefined rules and data.
Information Booster:
1. E-Governance in Education:
• Helps in digitizing processes like admissions, student record management, and result declaration.
• Improves access to resources and enhances institutional transparency.
2. Characteristics of E-Governance: Responsive, transparent, efficient, and objective.
Additional Knowledge:
• E-Governance also facilitates stakeholder engagement, including students, faculty, and policymakers.
• Misinterpreting it as "subjective" goes against its goal of reducing bias and errors.

S30. Ans.(c)
Sol. Using personal data without consent, especially for non-educational purposes, breaches privacy and is
considered unethical.

33 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster:
1. Acceptable Uses:
• Analyzing gender distribution (a).
• Auditing student internet use (b).
• Determining recipients for academic awards (d).
2. Unacceptable Uses: Sharing personal data for purposes unrelated to education without consent.
Additional Knowledge:
Data privacy laws (e.g., GDPR, COPPA) emphasize protecting personal data and ensuring informed consent for its
use.

S31. Ans.(a)
Sol. PARAM-Shivay is part of India’s National Supercomputing Mission and was developed at IIT-BHU with a capacity
of 833 teraflops.
Information Booster:
1. National Supercomputing Mission: Aims to install a network of supercomputers across academic and research
institutions in India.
2. PARAM-Series Supercomputers: Includes PARAM 8000, PARAM Yuva, and PARAM-Shivay, developed by C-DAC
(Centre for Development of Advanced Computing).
Additional Knowledge:
PARAM-Shivay is an indigenous supercomputer designed to support research and scientific calculations.

S32. Ans.(b)
Sol. Cloud Services Examples:
• Google Drive: Cloud storage and collaboration tool.
• MeghRaj: India’s Government Cloud Initiative.
• Dropbox: File storage and sharing platform.
Windows Explorer: Not a cloud service; it is a file management tool on local devices.
Information Booster:
1. What are Cloud Services?
• Cloud services store data and applications on remote servers, accessible via the internet.
• Examples include storage (Google Drive), software as a service (Office 365), and infrastructure as a service (AWS).
2. Types of Cloud Deployment Models: Public, Private, and Hybrid Clouds.
Additional Knowledge:
• Cloud services improve accessibility and collaboration by allowing users to work remotely.
• Windows Explorer is a traditional file management tool, not part of cloud infrastructure.

S33. Ans.(d)
Sol.

34 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster:
1. E-Commerce Websites: Examples: Amazon, Flipkart; used for online shopping.
2. Social Media Platforms: Examples: LinkedIn, Facebook; designed for networking.
3. News Websites: Examples: BBC, CNN; provide news and updates.
4. Search Engines: Examples: Google, Bing; help users find information on the internet.
Additional Knowledge:
Website categories often overlap (e.g., LinkedIn also offers news), but their primary purpose determines their
classification.

S34. Ans.(a)
Sol. Bharat Net: This Indian Government initiative connects 2,50,000 Gram Panchayats with high-speed broadband,
improving digital access in rural areas.
Information Booster:
1. Objective: Bridge the digital divide in rural India.
2. Applications: E-Governance, telemedicine, e-learning, and financial inclusion.
Additional Knowledge:
Option (b): NICNET supports e-Governance but not specific to Gram Panchayats.
Option (c): MeghRaj focuses on cloud infrastructure.
Option (d): e-Taal is a portal for monitoring e-Governance services.

S35. Ans.(b)
Sol. Immediate Access Store (C): Holds programs and data currently in use.
ALU (D): Performs calculations and logical operations.
Control Unit (A): Directs input/output device operations.
Information Booster:
CPU Components:
1. IAS: Temporary data storage for processing.
2. ALU: Executes arithmetic and logic tasks.
3. Control Unit: Coordinates overall CPU activity.
Additional Knowledge:
Option (c): Incorrect, as EEE (SSD) is a storage device, not part of the CPU.
Option (d): ASCII is unrelated to CPU roles.

S36. Ans.(a)
Sol. Convert (binary) to decimal:
Convert (hexadecimal) to decimal:
Add the decimal values:
Convert back to hexadecimal:
Thus, the sum is
Information Booster:
1. Binary System (Base 2): Uses two digits, 0 and 1. Each position represents a power of 2.
2. Hexadecimal System (Base 16): Uses sixteen symbols (0 – 9 and A – F). A represents 10, B represents 11, and so
on.

35 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S37. Ans.(d)
Sol. (A) Hyperlink - (III): A link on a web page directing to another location.
(B) Hotspot - (I): An interactive area on a graphic triggering actions.
(C) HTTP - (IV): Protocol for transferring web pages.
(D) Pixel - (II): The smallest editable unit in a graphic.
Information Booster:
Definitions:
1. Hyperlink: Connects users to webpages or files.
2. Hotspot: Clickable regions on images or graphics.
3. HTTP: Foundation of the World Wide Web.
4. Pixel: A single point in a digital image.
Additional Knowledge:
Option (a): Incorrect. Mismatched associations.
Option (b): Incorrect. Hotspot is not associated with HTTP.
Option (c): Incorrect. Reverses the definitions of Pixel and HTTP.

S38. Ans.(c)
Sol. File name (B): The file being accessed is index.htmlindex.htmlindex.html.
Host name (C): The domain is example.orgexample.orgexample.org.
Protocol (E): HTTPS is the secure protocol in use.
Information Booster:
URL Components:
1. Protocol (e.g., HTTP, HTTPS).
2. Host name (e.g., www.example.com).
3. File name (e.g., index.html).
Additional Knowledge:
Option (a): Browser name is not part of a URL.
Option (d): Email address is not in the URL.

S39. Ans.(c)
Sol. To record voice narration in Microsoft PowerPoint, you need the following:
• A (Sound card): This hardware component allows for audio input/output, essential for recording and playing
audio.
• E (Microphone): You need a microphone to capture the narration.
While speakers are useful for playback, they are not required for recording. The internet connection and external
video port are not needed for voice narration.
Information Booster:
1. Sound cards process audio signals from a microphone and output them to speakers.
2. Microphones are input devices that capture audio and are essential for voice recording.
Additional Knowledge:
Modern laptops often come with built-in sound cards and microphones, making it easier to record audio.

S40. Ans.(c)
Sol. IPv4 uses a 32-bit address, which allows for 2^32 possible addresses. This gives us approximately 4.3 billion
unique addresses. IPv6, on the other hand, uses a 128-bit address, which provides 2^128 possible addresses. This
leads to 340 undecillion addresses (or 340 trillion trillion trillion addresses).
36 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
The correct comparison is as follows:
IPv6 has 4 times the number of bits compared to IPv4. However, in terms of the addressing structure, the number
of addresses increases exponentially. IPv6 can handle 2^96 more addresses than IPv4, which is approximately 6
times larger than IPv4 when considering address space allocation and structure.
Information Booster:
1. IPv4 addresses are written in dotted decimal format (e.g., 192.168.0.1) and use four 8-bit fields.
2. IPv6 addresses are written in hexadecimal format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334) and
use eight 16-bit fields.
Additional Knowledge:
• IPv6 was introduced to address the issue of IP address exhaustion due to the rapid expansion of internet-connected
devices.
• IPv6 also offers additional features such as simplified packet headers, better security through IPsec, and improved
performance with network autoconfiguration.

S41. Ans.(c)
Sol. Blogs - Blogs are generally recognized as personal internet journals where individuals share their thoughts,
ideas, or experiences on a regular basis. Correct Match: A-IV
Podcasts - Podcasts consist of a series of digital media files, usually audio, which users can listen to on demand.
Correct Match: B-III
Tagging - Tagging refers to a type of bookmarking that enables users to categorize and organize content, such as
web pages or photos, using keywords or tags. Correct Match: C-II
Wikis - Wikis are collaborative websites that allow users to create and edit web pages using a browser. Examples
include Wikipedia and other similar collaborative knowledge platforms. Correct Match: D-I
Information Booster 1. Blogs (Personal Internet Journals) - Primarily written by individuals for personal
expression, it serves as an online diary.
2. Podcasts (Series of Digital Media Files) - These can be episodic and cover a variety of topics, which users can
subscribe to and download.
3. Tagging (Bookmarking with Keywords) - Useful for content categorization, social media often employs tagging
to organize posts.
4. Wikis (Collaborative Platforms) - Wikis support content creation by multiple users, allowing content to be
updated collectively.

S42. Ans.(d)
Sol. The development of computers can be traced through these technological advancements:
1. First Generation – Vacuum Tubes (C)
2. Second Generation – Transistors (A)
3. Third Generation – Integrated Circuits (D)
4. Fourth Generation – Microprocessor (B)
Correct order: C → A → D → B.
Information Booster:
1. Vacuum Tubes: Used in the earliest computers, they were large and inefficient.
2. Transistors: Replaced vacuum tubes and were smaller, faster, and more reliable.
3. Integrated Circuits: Allowed for the development of smaller and more powerful computers by integrating
multiple transistors on a single chip.
4. Microprocessors: Enabled personal computers by placing the CPU on a single chip. The Microprocessor was
invented in 1971 by Intel and is the foundation for modern computing.

37 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S43. Ans.(b)
Sol.

S44. Ans.(a)
Sol. In MS-Excel, when a formula is copied to another cell, the references in the formula change based on the relative
or absolute reference type. The dollar sign $ indicates an absolute reference, meaning the row or column will not
change when the formula is copied to another cell. Here's the breakdown:
• B$1 is an absolute reference to row 1, so when the formula is copied to another cell, the column (B) changes, but
the row (1) remains fixed.
• C$3 is an absolute reference to row 3, so when copied, the column (C) changes, but the row (3) stays fixed.
• The constant 5 remains unchanged regardless of where the formula is copied.
When copying the formula from D9 to F12:
• The B$1 reference moves from column B to column D, so it becomes D$1.
• The C$3 reference moves from column C to column E, so it becomes E$3.
• The constant 5 stays as is.
Thus, the new formula in cell F12 will be: =D$1+E$3+5
Information Booster:
1. Absolute References: In Excel, the dollar sign $ is used to fix a reference to a specific row or column. For example,
$A$1 fixes both the row and column, A$1 fixes the row, and $A1 fixes the column.
2. Relative References: If there is no dollar sign, the reference is relative. This means that both the row and column
can change when the formula is copied to another cell.

38 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


3. Mixed References: We can use mixed references (e.g., A$1 or $A1) to lock either the row or the column while
allowing the other part to adjust when copied.
Additional Knowledge:
Copying Formulas: When you copy a formula across multiple cells in Excel, understanding how references work
(relative vs. absolute) can help you avoid errors and ensure that formulas work as intended.

S45. Ans.(b)
Sol. A. Authentication: Verifies data and works with encryption (matches with III).
B. Biometrics: Uses human characteristics such as retina scans (matches with II).
C. IP Address: Locates where a device is on the network (matches with IV).
D. MAC Address: Identifies which device is connected to the network (matches with I).
Information Booster:
1. Authentication ensures that data comes from trusted sources.
2. Biometrics relies on physical characteristics like fingerprints or retina scans.
3. IP Address helps route data to the correct location.
4. MAC Address is unique to each network device.

S46. Ans.(d)
Sol.

39 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster:
1. Base Conversion: Converting a decimal number to another base involves dividing the integer part by the base and
noting the remainders. For the fractional part, multiply by the base and note the integer part at each step.
2. Fractional Conversion: For fractional parts, repeatedly multiply the fractional part by the new base. The integer
parts of the results give the digits of the fractional part in the new base.
3. Validating Equalities: When asked to validate base conversions, carefully follow the step-by-step process for both
integer and fractional parts.

S47. Ans.(b)
Sol. Indigenous knowledge and resource management systems have been honed over centuries to adapt to local
environmental conditions, sustainable practices, and resource conservation techniques. These systems are closely
linked to adaptation responses, as they help communities adjust to changes in climate, ecosystem shifts, and other
environmental stressors. This adaptation often involves using traditional practices to manage resources sustainably
and develop resilience to climate-related impacts.
1. Adaptation Response: Indigenous systems are typically designed to adapt to environmental changes, making
them resilient in the face of shifting conditions. They may include water management techniques, crop diversity, and
resource-sharing practices tailored to specific local challenges.
2. Mitigation vs. Adaptation: While mitigation seeks to reduce or eliminate the root causes of climate change (e.g.,
reducing greenhouse gases), adaptation focuses on adjusting to its inevitable effects. Indigenous knowledge is
primarily about adaptation, helping communities live sustainably in response to their environmental realities.
40 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
3. Ethical Response: While ethical considerations are an essential part of indigenous knowledge systems, their core
function is not necessarily about ethics in isolation, but rather about practical, sustainable management of resources.
4. Decarbonization Response: Indigenous knowledge can play a role in decarbonization, especially when it comes
to sustainable land and resource management. However, it is more directly associated with adaptation and resilience-
building strategies than with carbon-reduction efforts alone.
Information Booster:
1. Indigenous Knowledge: Indigenous knowledge systems often incorporate holistic views of nature and
sustainability. These systems prioritize long-term ecological balance, conservation, and adaptation to climatic
fluctuations.
2. Adaptation Practices: Examples of indigenous adaptation strategies include water harvesting in arid regions,
crop diversification, agroforestry, and the use of natural buffers like wetlands to mitigate flooding.
3. Key Differences Between Mitigation and Adaptation: Mitigation seeks to address the root causes of
environmental changes (e.g., reducing emissions), while adaptation focuses on strategies for coping with and
adjusting to the outcomes of those changes.
Additional Knowledge:
• Indigenous Resource Management: Practices like rotational grazing, traditional farming methods, and
community-based forestry have been integral to sustainable resource management in indigenous cultures. These
practices have been crucial for maintaining ecological balance and adapting to changing environmental conditions.
• Resilience to Climate Change: Indigenous knowledge contributes significantly to community resilience. It
provides tools for managing risks, ensuring food security, and supporting biodiversity, all of which are essential as
climate change impacts intensify.

S48. Ans.(b)
Sol. Hypertext refers to text that is linked to other texts or webpages. The underlined word (link) in the statement
is an example of hypertext because clicking it will take the user to a different webpage with related information.
Information Booster:
The invention of hypertext is often attributed to Tim Berners-Lee, who also invented the World Wide Web.
Additional Knowledge:
HTML (HyperText Markup Language) is the language used to structure a webpage, but Hypertext is the method of
linking within or between pages.

S49. Ans.(c)
Sol.

41 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S50. Ans.(b)
Sol.

42 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S51. Ans.(d)
Sol. Cloud computing word processing software offers several key advantages:
A. The user does not have to install word processing software on the computer:
True: With cloud-based word processors like Google Docs or Microsoft Word Online, the software is hosted on the
cloud, so there is no need to install it locally on your device.
B. The user does not have to allocate space to install software in the hard disk:
True: Since the word processing software is cloud-based, there is no need to install any software on your local hard
drive, saving storage space.
C. Storage space to save the document is provided by the cloud provider. The user can open or edit the
document from any computer which has an Internet facility:
True: Cloud-based software provides cloud storage, allowing users to store and access their documents from any
internet-enabled device. For example, Google Drive offers storage for Google Docs, and users can access and edit
documents from anywhere.
Information Booster:
1. Cloud-based word processing like Google Docs allows for real-time collaboration and editing, which is especially
useful for teams working remotely.
2. Automatic backups are often included, so users don’t have to worry about saving their work manually. Documents
are continuously saved in the cloud.
3. Popular cloud-based word processing tools include Google Docs, Microsoft Word Online, and Zoho Writer,
which allow users to access documents across multiple devices and platforms without requiring software
installation.
Additional Knowledge:
D. If the user has a slow Internet connection, then he/she would not face any problems accessing or
downloading his/her documents:

43 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


False: This statement is incorrect. Slow internet connections can significantly impact the user’s ability to access,
download, or edit cloud-based documents efficiently, as these tasks depend heavily on a stable and fast internet
connection.

S52. Ans.(b)
Sol. In computer networking, converting a domain name (like www.abc.edu) into an IP address is done using the
DNS (Domain Name System) protocol.

S53. Ans.(d)
Sol. Components for computing, storing data temporarily, and storing data permanently:
(i) Computing: This is handled by the CPU (Central Processing Unit).
(ii) Storing data temporarily: This is done by RAM (Random Access Memory).
(iii) Storing data permanently: This is done by the Hard Disk Drive (HDD).
Thus, the correct sequence of components for the given functions is (C), (A), (B), which corresponds to the CPU,
RAM, and Hard Disk Drive.

S54. Ans.(d)
Sol. An IPv6 address consists of eight 16-bit blocks, typically written in hexadecimal format. Each block contains 16
bits, and there are 8 blocks.
The total number of unique addresses supported by IPv6 is:
655368 = (216)8 = 2128

S55. Ans.(d)
Sol. Moore's Law states that the number of IC chips in a computer double approximately every 2 years. This means
that the computational power also doubles every 2 years.
Over 10 years, the computational power will double 5 times (since 10 years = 5 cycles of 2 years).
Thus, the computing power in 10 years will be 25 = 32 times more powerful than it is now.
Information Booster
1. MOOCs:
• The rise of MOOCs has made education accessible to anyone with an internet connection, helping students and
professionals learn at their own pace.
• Popular platforms include Coursera, edX, and Udemy, which offer courses from prestigious universities around the
world.
• The flexibility of learning and the availability of self-paced courses are key advantages for many learners.
2. IPv6 Addresses:
• IPv6, with its 128-bit address space, allows a vastly larger number of unique addresses compared to the 32-bit IPv4
address space.
• The unique feature of IPv6 is its ability to handle the growing number of devices on the internet, ensuring that
every device can have a unique address.
• IPv6 is already being adopted by large tech companies, and its full adoption is expected to resolve IPv4 address
exhaustion.
3. Moore's Law:
• Moore's Law has been a guiding principle in semiconductor technology, predicting the rapid growth of
computational power.
• While Moore’s Law has held true for several decades, experts predict it may slow down as physical limitations of
silicon technology are reached.
• The future of computing could involve advances in quantum computing and alternative materials for processors.

44 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S56. Ans.(c)
Sol. Assertion (A) is true because MOOCs have been gaining immense popularity due to their flexible learning
format, allowing access to quality education worldwide.
Reason (R) is false. Although MOOCs allow learning at one's convenience, the claim that "delivery of quality
education is location-specific" is incorrect. The essence of MOOCs is to provide access to education that transcends
geographic limitations, thus not location-specific.

S57. Ans.(b)
Sol. The correct answer is (b) A - II, B - I, C - IV, D - III.
A. System Software matches with II. Pen Drive because system software includes operating systems and utilities
that help manage hardware, whereas a pen drive is often associated with external storage that might hold system
software.
B. Input Device matches with I. Keyboard, because a keyboard is a device used to input data into a computer.
C. Output Device matches with IV. Printer, as printers are output devices that print the processed data from the
computer.
D. Secondary Storage Device matches with III. Linux, because Linux can be installed and run from a secondary
storage device like a hard drive or SSD.
Information Booster 1. System Software: System software is the software that runs and manages hardware
components, providing the platform for running application software. Examples include operating systems like
Windows, macOS, and Linux. It also includes utility programs that help manage computer resources such as
memory, processors, and storage.
2. Input Devices: Input devices are hardware components that allow users to input data into a computer system.
Common examples include keyboards, mice, scanners, and microphones. Keyboard is one of the most common
and essential input devices.
3. Output Devices: Output devices display or produce the results of computer processes. Examples include
monitors, printers, and speakers. Printer is a typical example of an output device that transfers data from the
computer to a physical medium (paper).
4. Secondary Storage Devices: Secondary storage refers to non-volatile storage that retains data even when the
power is off. Examples include hard drives, SSDs, USB flash drives (Pen Drive), and optical media like CDs and
DVDs. Linux is an operating system, which is typically stored on secondary storage devices such as hard drives or
USB drives.

S58. Ans.(a)
Sol. Given:
Storage space required by each image = 1MB
Camera captures image at every 5 seconds

Image captured in 1 minute


Image captured in every hour
Images captured in 24 hour
Space required to store 17,280 images
We know that, 1GB = 1024 MB, hence:

Total storage required in GB to store the images

45 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S59. Ans.(b)
Sol.

Binary and Hexadecimal Systems: The binary system (base 2) uses digits 0 and 1, and is primarily used in
computers. The hexadecimal system (base 16) uses digits 0-9 and letters A-F to represent values 10-15, making it
more compact for representing large binary values.
Common Mistakes in Number System Conversions: It is important to remember the correct powers of the base
when converting between number systems, and to double-check calculations to avoid errors.
Additional Knowledge: Octal and Hexadecimal Notation:
• Octal (base 8) and Hexadecimal (base 16) are often used in computing because they provide a more human-
readable way to represent binary data.
• For instance, every three binary digits (bits) correspond to one octal digit, and every four binary digits correspond
to one hexadecimal digit.

46 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S60. Ans.(d)
Sol. The correct answer is (d) A and C only.
Statement A: True. Bluetooth is primarily designed for short-range data transfer between devices like phones,
headphones, computers, and speakers. It works within a short range, typically around 10 meters. On the other hand,
Wi-Fi allows devices to connect to the internet wirelessly, with a broader range (up to 100 meters or more, depending
on the standard). Wi-Fi is used for internet connectivity in homes, offices, and public places.
Statement B: False. Bluetooth does not require a direct line of sight for data transmission. Bluetooth signals are
able to pass through obstacles like walls and furniture, though performance may degrade with distance or
interference. Wi-Fi, similarly, does not strictly require a direct line of sight but is more prone to interference when
there are obstructions like thick walls between devices.
Statement C: True. Bluetooth has a limitation on the number of devices that can connect simultaneously. Typically,
a Bluetooth network can connect up to seven devices at once in a piconet configuration. In contrast, Wi-Fi can
support a much larger number of devices, especially with modern standards like 802.11ac or 802.11ax, which are
designed for dense environments such as offices and public hotspots.
Statement D: False. Bluetooth does not require a direct line of sight, while Wi-Fi does not need a direct line of sight
either. Both technologies rely on radio frequency (RF) waves, and while obstacles can reduce the quality of the
connection, neither strictly requires a line of sight.
Information Booster: 1. Bluetooth Range and Limitations (A & C):
• Bluetooth is designed for low-power, short-range communication. Typically, it operates in ranges from 1 to 100
meters, depending on the Bluetooth class. The technology is commonly used for connecting peripherals like wireless
keyboards, mice, headphones, and fitness trackers.
• Wi-Fi, in comparison, is used for higher-speed data transmission over a longer range, providing internet
connectivity to multiple devices within a home or office network. It supports hundreds of devices, making it suitable
for large networks.
2. Data Transmission without Line of Sight (B & D):
• Both Bluetooth and Wi-Fi can operate without a direct line of sight, as they use radio waves. However, performance
can be affected by physical obstructions (walls, furniture), electromagnetic interference, and the distance between
devices. Bluetooth tends to have a shorter range and is more susceptible to interference from obstacles, while Wi-Fi
typically has a longer range and can handle interference better.
Additional Knowledge: • Bluetooth (B): Bluetooth was originally designed for short-range device-to-device
communication and works using a frequency of 2.4 GHz. It does not require a direct line of sight, allowing users to
connect devices in environments with obstacles.
• Wi-Fi (D): While Wi-Fi also doesn't need a line of sight, obstacles such as walls and thick materials can degrade
the signal strength and range. Wi-Fi networks are typically more robust in terms of handling interference and
supporting larger numbers of connected devices.

S61. Ans.(b)
Sol. The correct answer is (b) C and D only.
Statement A: "Data in spreadsheets are always correct." This statement is false. While spreadsheets are powerful
tools for data management, the data they contain is only as accurate as the input. Spreadsheets do not automatically
check or validate the correctness of data, so users must manually ensure the correctness of the entered data.
Statement B: "Spreadsheet software cannot draw bar graphs." This statement is false. MS Excel, and other
spreadsheet software, can indeed draw bar graphs. In fact, Excel provides a wide variety of charting options,
including bar graphs, line charts, pie charts, etc.

47 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Statement C: "Spreadsheet software automatically recalculates." This statement is true. Spreadsheet software,
including MS Excel, automatically recalculates formulas when the data in referenced cells change. For example, if you
modify a value in a cell that a formula depends on, Excel will automatically update the result of the formula without
requiring any manual intervention.
Statement D: "Some cells in a spreadsheet can be locked to prevent a user changing its contents." This
statement is true. Excel allows users to lock certain cells in a worksheet to prevent changes. This feature is often
used when sharing a spreadsheet but ensuring that certain critical cells (like formulas or headers) remain protected.
Users can lock cells by selecting them, right-clicking to format them, and checking the "locked" option in the cell
protection settings.
Information Booster 1. Automatic Recalculation (C): MS Excel is designed to automatically recalculate formulas
whenever a referenced value changes. For example, if you have a sum formula like =SUM(A1:A10) and you change
any value within that range, Excel will update the result immediately. This feature is extremely useful for real-time
data analysis and calculations.
2. Locking Cells (D): You can lock specific cells in Excel to prevent them from being edited. To do this, select the cells
you want to protect, right-click and choose "Format Cells." Then, in the "Protection" tab, check "Locked." After this,
you must protect the sheet by selecting Review > Protect Sheet, which will prevent unauthorized editing of the
locked cells.
Additional Knowledge • Data Accuracy (A): Incorrect. The data in a spreadsheet is only correct if entered correctly.
Excel does not automatically check or correct data; it is up to the user to ensure its accuracy.
• Bar Graphs (B): Incorrect. MS Excel allows users to create a variety of graphs, including bar graphs, line charts,
and pie charts, to visually represent data. These graphs help in analyzing trends, distributions, and comparisons in
the data.

S62. Ans.(d)
Sol. The correct answer is d. Data matrix printers are noisy, low quality, and slow in comparison to laser
printers.
• Data matrix printers are often considered slow and noisy, and they tend to have lower print quality compared to
laser printers. They are typically impact printers that use pins or hammers to strike an inked ribbon against paper.
• Laser printers, on the other hand, use laser technology to create high-quality prints at much faster speeds, with
quiet operation.
Information Booster 1. Impact vs. Non-Impact Printers:
• Impact printers create images by physically striking the paper, such as in dot matrix printers or line printers.
They tend to be noisier and slower than non-impact printers.
• Non-impact printers (like laser printers and inkjet printers) do not strike the paper. Instead, they use toner, ink,
or other technologies, providing quieter and faster printing with higher print quality.
2. Laser Printers:
• Laser printers use a laser beam to create an electrostatic image on a drum that attracts toner particles. This image
is transferred to paper and then fixed by heat. Laser printers are known for their high resolution, fast printing speeds,
and quiet operation.
• Resolution in laser printers is measured in DPI (dots per inch), which indicates the print quality.
Additional Knowledge Resolution (C): Incorrect. The resolution of a laser printer is measured in DPI (dots per
inch), which refers to how many dots can be printed within a 1-inch space. Mbps is a measurement for data transfer
speed, not print resolution.

48 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


S63. Ans.(b)
Sol. Integrated Circuit (IC) based technology: The third generation of computers used integrated circuits (ICs) as
their key technology. ICs allowed multiple transistors to be placed on a single silicon chip, significantly improving
processing speed and efficiency while reducing the size and cost of computers.
Information Booster:
Generations of Computers:
First Generation: Used vacuum tubes for circuitry and magnetic drums for memory.
Second Generation: Replaced vacuum tubes with transistors.
Third Generation: Introduced Integrated Circuits (ICs), which combined transistors and other electronic
components into a single chip.
Fourth Generation: Brought microprocessors, which integrated the entire central processing unit (CPU) onto a
single chip.
Advantages of ICs in the Third Generation:
Smaller in size, faster processing speeds, and more reliable than previous generations.
Additional Knowledge:
Key Inventors: Jack Kilby and Robert Noyce are credited with independently inventing the integrated circuit in the
late 1950s.

S64. Ans.(b)
Sol. A. IP Address (II): Identifies where a device is connected on a network.
B. MAC Address (IV): Uniquely identifies a network interface card (NIC) and is used for communication within a
network.
C. Authentication (I): Verifies the identity of a user or device.
D. Encryption (III): Ensures that data is securely transmitted and accessible only to authorized individuals.
Information Booster:
IP Address: A unique string of numbers separated by periods that identifies each computer using the Internet
Protocol to communicate over a network.
MAC Address: A unique identifier assigned to a network interface for communications at the data link layer of a
network segment.
Authentication: The process of verifying the identity of a user or device, typically by matching credentials like
usernames and passwords.
Encryption: The process of converting data into a coded form to prevent unauthorized access.
Additional Knowledge:
Network Security: Both MAC addresses and IP addresses are essential for network security and routing data
correctly. Encryption adds another layer of protection for sensitive information during transmission.

S65. Ans.(c)
Sol. In the context of human-computer interaction:
A GUI (Graphical User Interface) is an interface built around visual elements.
OS (Operating System) is a software that manages hardware and software resources.
A Window is a region of the screen that displays information.
An Icon is a small picture used to represent folders, software, etc.
A Menu is a list of options that the user can select from.

49 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster:
GUI (Graphical User Interface): Provides an easy-to-use interface with windows, icons, and menus.
Operating System (OS): Software that manages computer hardware and software resources and provides services
for computer programs.
Windows OS: Windows 11, as an example, is a GUI-based operating system.
Additional Knowledge:
Icons and Menus: These are important components of a GUI. Icons provide visual cues to users, while menus organize
available actions or options in a list format.

S66. Ans.(a)
Sol. Open-source software is distributed with its source code, allowing anyone to view, modify, and enhance the
software.
It permits users to modify the software to fit their needs.
Linux is a well-known example of open-source software.
Statement C is incorrect because open-source software is not trial software that requires payment after a trial period.
Information Booster:
Open Source Software: Examples include Linux, Apache, and Mozilla Firefox. These programs allow users and
developers to modify and distribute the software freely.
Benefits of Open Source:
Flexibility: Users can modify the code to suit specific needs.
Community-driven development: Improvements and updates are often driven by a community of developers.
Additional Knowledge:
Difference between Freeware and Open Source:
Freeware is free to use but doesn't necessarily provide access to the source code.
Open Source allows users to modify and redistribute the software under specific licenses like the GNU Public License
(GPL).

S67. Ans.(d)
Sol. The most stable computer network with the fastest data transmission is achieved by connecting devices to a
switch using optic fibre cables. This setup offers high-speed, reliable, and interference-free data transmission.
Option (d): Connect devices to a switch using optic fibre cables
• Switch: A device that connects multiple devices in a network and facilitates efficient communication between them
by directing data to the correct destination.
• Optic Fibre Cables:
• Provide extremely high-speed data transmission (up to terabits per second).
• Are resistant to electromagnetic interference, ensuring a stable and secure network.
• Offer low latency and high reliability, ideal for high-performance networks.
Conclusion: This setup is the most stable and fastest, making it the correct answer.
I nformation Booster
Why Use Optic Fibre Cables?
1. Speed: Supports speeds up to 100 Gbps or more.
2. Stability: Immune to electromagnetic interference, ensuring consistent performance.
3. Security: Difficult to tap or intercept data, enhancing network security.

50 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Advantages of Switches in Networks:
1. Efficiently manages data traffic between devices in a network.
2. Reduces collisions in data packets by directing data only to the intended device.
3. Scales easily for larger networks.
Use Cases for Optic Fibre Networks:
1. High-performance enterprise networks.
2. Data centers and cloud infrastructure.
3. High-speed internet connections (FTTH - Fibre to the Home).
Additional Knowledge
• Wireless Access Points: Convenient but prone to lower speeds and signal interference.
• Mobile Phone Tethering: Suitable for temporary connections but unreliable for stable networks.
• Coaxial Cables: Legacy technology often replaced by modern alternatives like Ethernet or optic fibre.
• Option (a): Use a wireless access point to connect devices: Wireless connections are convenient but prone to
interference, reduced speed, and lower reliability compared to wired connections.
• Option (b): Connect devices wirelessly using a mobile phone: This relies on mobile data (e.g., 4G/5G), which
may have high latency and variable speeds depending on network conditions. It is not suitable for creating a stable
network for continuous or high-speed communication.
• Option (c): Use coaxial cables to connect devices in sequence: Coaxial cables are older technology with limited
data transmission speed and bandwidth compared to optic fibre. Connecting devices "in sequence" (daisy-chaining)
creates dependency on each device, reducing network stability.

S68. Ans.(b)
Sol. The correct method is (b) Read the document from the CD-ROM, modify the document, then save it back
to the CD-ROM.
Since CD-ROMs are read-only media, you cannot directly save changes back to the CD-ROM. The modified version
of the document should be saved to the hard disk first and then written to the CD-ROM if needed (using CD burning
software). However, if saving it to the CD-ROM is essential, you'd first need to copy the document to the hard disk,
modify it, and then burn it to the CD.
Information Booster
1. CD-ROMs are Read-Only: CD-ROMs do not allow data to be written directly. Therefore, any changes made to the
document must first be saved to a writable storage medium.
2. Burning to CD: To store modified documents on a CD, you need CD burning software to write data back to the CD.
Additional Knowledge
• Saving Directly to CD-ROM: Incorrect. CD-ROM is read-only, so it does not allow direct modification.
• Copy to Hard Disk First: Incorrect. You cannot modify the document directly on a CD-ROM.

S69. Ans.(b)
Sol. The correct answer is Both Statement I and Statement II are false.
Statement I is actually describing Phishing, not Spam. Phishing involves masquerading as a trustworthy entity to
steal sensitive information.
Statement II is describing Spam, which refers to unsolicited bulk email, typically for advertising purposes, not
phishing attempts.
Information Booster
1. Phishing: Phishing is an attempt to steal sensitive information by pretending to be a legitimate entity (e.g., through
fake emails or websites).
51 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
2. Spam: Spam refers to bulk unsolicited emails, which are often sent for advertising or promotional purposes, but
not necessarily for malicious intentions.
Additional Knowledge
• Phishing (Definition): Incorrect. Phishing is not bulk email but a method of stealing information.
• Spam (Definition): Incorrect. Spam refers to bulk, unsolicited emails, not attempts to steal information.

S70. Ans.(a)
Sol. The correct answer is B, C and D only.
• Optical Mark Reader (OMR) (B) is an input device used to read marked data from documents, typically in exams
or surveys.
• Graphic Tablet (C) is an input device that allows users to draw or input data with a stylus.
• Light Pen (D) is an input device used to select or draw on the screen by pointing to it.
• Headphones (A) are output devices, as they produce sound for the user.
• Projector (E) is an output device, as it projects images or videos onto a screen.
Information Booster
1. Optical Mark Reader (OMR): A device that reads marks on paper, commonly used in exams to automate grading.
2. Graphic Tablet: An input device that allows precise drawing and handwriting, often used by designers and artists.
3. Light Pen: A pointing device used to interact with the screen by detecting light emitted by the monitor.
Additional Knowledge
• Headphones (Output): Incorrect. Headphones are output devices, used for delivering sound to the user.
• Projector (Output): Incorrect. A projector is used to display visual content onto a screen, making it an output
device.

S71. Ans.(d)
Sol. If the computer has only 1 GB RAM, which is the minimum requirement, the OS will likely install but may not run
optimally due to insufficient memory. The system might run slowly, and performance issues such as delays and lags
are expected.
Information Booster
1. Minimum RAM Requirements: Software often has a minimum RAM requirement for optimal performance. While
the OS can be installed with the minimum requirement, it may not function efficiently.
2. Optimum Performance: To ensure smooth performance, meeting or exceeding the recommended RAM is advised.
Additional Knowledge
• File Saving Issues (a): Incorrect. The issue is with performance, not saving files.
• Peripheral Device Failures (b): Incorrect. Peripheral devices should still work but may perform poorly in limited
RAM environments.
• OS Fails to Install (c): Incorrect. The OS should install, but performance will not be optimal with 1 GB RAM.

S72. Ans.(d)
Sol. The correct answer is C only.
Wearable devices like hearing aids help assist people with hearing impairments.
Wearable devices do not typically provide security (A) or allow sharing of an internet connection (B). These
functions are more relevant to other types of technology (e.g., routers, security software).
Information Booster
1. Hearing Assistive Wearables: Wearable devices such as hearing aids are specifically designed to assist hearing-
impaired individuals by amplifying sound.
52 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
2. Security and Sharing Functions: Wearable devices do not typically offer higher security or share internet
connections; these are not the primary purpose of wearables.
Additional Knowledge
• Security & Sharing (A and B): Incorrect. Wearables do not usually focus on internet sharing or security functions.
• Hearing Assistance (C): Correct. Devices like hearing aids are wearable tech designed to help with hearing
impairments.

S73. Ans.(c)
Sol. Given:
Storage by movie =16GB
Download speed = 64MB per second
Solution:
1 gigabyte = 1024 megabytes
Total storage of movie = 16 GB
Storage in megabytes

Total time required to download the movie seconds


Information Booster
1. Download Speed: The download speed directly impacts how long it takes to transfer files over the internet.
2. Conversion from GB to MB:
1 GB = 1000 MB, so 16 GB = 16,000 MB

S74. Ans.(b)
Sol. The correct answer is D and E only.
• Telephone calls (D) and Instant Messaging (E) are synchronous forms of communication because they occur in real
time, requiring both parties to be present and engaged simultaneously.
• Email (A), Instagram posts (B), and Blogging (C) are asynchronous forms of communication, meaning the
interaction does not require both parties to be present at the same time.
Information Booster
1. Synchronous Communication: Synchronous communication occurs in real-time, requiring both parties to be
present simultaneously.
2. Asynchronous Communication: Asynchronous communication allows the sender and receiver to be separated in
time and doesn’t require real-time interaction.
Additional Knowledge
• Email, Instagram posts, and Blogging: Incorrect. These are all asynchronous forms of communication, as they don't
require real-time interaction.
• Telephone calls and Instant Messaging: Correct. Both require simultaneous engagement.

S75. Ans.(d)
Sol. The correct matching is A - III, B - I, C - IV, D - II.
• System Software (A) refers to software like Linux (III), which manages hardware and allows applications to run.
• Input Device (B) refers to hardware like the Keyboard (I), which is used to enter data into a computer.
• Output Device (C) refers to hardware like the Printer (IV), which produces a hard copy of data.
• Secondary Storage Device (D) refers to storage media like a Pen Drive (II), used for long-term data storage.
53 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
Information Booster
1. System Software: System software manages hardware resources and includes operating systems like Linux.
2. Input Device: Input devices like keyboards allow users to enter data into a system.
3. Output Device: Output devices like printers display or produce output from a computer.
4. Secondary Storage Device: Devices like pen drives provide external, non-volatile storage.

S76. Ans.(a)
Sol. The correct order from slowest to fastest speed is E, C, A, B, D.
• CD-ROM (E) is the slowest because it is an optical storage medium with slow read speeds.
• Hard Disk (C) is slower than RAM but faster than CD-ROM as it is a magnetic storage device.
• Main memory (RAM) (A) is much faster than hard disk storage, as it is volatile memory used to store actively used
data.
• L2 Cache (B) is faster than RAM, but slower than L1 cache, serving as a secondary cache.
• L1 Cache (D) is the fastest memory in the hierarchy, as it is built directly into the processor for rapid access to
frequently used data.
Information Booster
1. CD-ROM: Optical storage with slow data transfer rates.
2. Hard Disk: Magnetic storage that is slower than RAM but faster than optical disks.
3. RAM: Volatile, high-speed memory used for active processes.
4. Cache Memory (L1, L2): Cache memory is faster than RAM, with L1 being the fastest as it’s integrated into the CPU.
Additional Knowledge
• L1 Cache as Slow: Incorrect. L1 Cache is the fastest memory.
• Hard Disk Faster than RAM: Incorrect. RAM is much faster than a Hard Disk.

S77. Ans.(d)
Sol. The correct order is C, A, D, B.
• C (Non-impact): Laser printers are non-impact printers, meaning they don't physically strike the paper.
• A (High): Laser printers produce high quality printouts.
• D (Toner): Laser printers use toner (powder) to print on paper.
• B (Dot Matrix): Dot Matrix printers are impact printers and can produce carbon copies, unlike laser printers.
Information Booster
1. Non-impact Printers: Non-impact printers like laser printers use lasers or other methods to print without
physically striking the paper.
2. High-Quality Output: Laser printers provide high-quality prints, especially for text and graphics.
3. Toner vs. Ink: Toner is used in laser printers, while ink is used in inkjet printers.

S78. Ans.(b)
Sol. The correct answer is A, B, C and D only.
• DuckDuckGo, Google, Yahoo Search, and Bing are all web search engines that allow users to search the internet
for websites, images, videos, and other online content.
• Pinterest is not a search engine, but a social media platform where users can share images and organize them into
boards.
Information Booster
1. Google: Google is the most widely used search engine worldwide, known for its accuracy and wide range of search
features.

54 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


2. Bing: Bing is Microsoft's search engine and offers similar functionalities to Google, including web search, image
search, and news updates.
3. DuckDuckGo: DuckDuckGo is a privacy-focused search engine that doesn't track user data or search history.
4. Yahoo Search: Yahoo Search is an older search engine that is still in use today, although it now uses Bing for search
results.
Additional Knowledge
Pinterest: Incorrect. Pinterest is a visual discovery engine, but not a search engine.

S79. Ans.(b)
Sol.

S80. Ans.(c)
Sol. The correct answer is Statement I is correct but Statement II is incorrect.
Statement I: ROM (Read-Only Memory) is non-volatile and typically cannot be written to or changed by normal
computer processes. ROM stores firmware or critical data that does not change often, such as the BIOS.
Statement II: RAM (Random Access Memory) is volatile and can be both read from and written to. It is temporary
memory that holds data for active processes, and it loses its contents when the power is turned off.
Information Booster
1. RAM (Random Access Memory): RAM is volatile and temporarily stores data that is being actively used by the
processor. It allows both read and write operations.
2. ROM (Read-Only Memory): ROM is non-volatile and primarily used for storing the firmware or permanent
system instructions like the BIOS.

S81. Ans.(b)
Sol. The correct answer is Danny is aware that Ashok and Bobby received the email. In the email system, if an
email is sent to multiple recipients using the "To" field, each recipient can see the other recipients' email addresses.
Therefore, Danny knows that Ashok and Bobby received the email, but Bobby and Ashok are not aware of each other’s
receipt (unless "CC" or "BCC" is used).

55 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster
1. "To" Field in Email: When an email is addressed to multiple recipients in the "To" field, each recipient can see
who the other recipients are.
2. CC vs. BCC: "CC" (Carbon Copy) allows recipients to see who else received the email, while "BCC" (Blind Carbon
Copy) hides the recipients from each other.
3. Email Privacy: In most cases, the "To" and "CC" fields are visible to all recipients, while BCC recipients remain
anonymous to others.
Additional Knowledge
• Bobby and Danny are aware that Ashok received the email: Incorrect. This would only be the case if they were
in the "CC" field or if the email was visible to all recipients.
• Ashok is aware that Bobby and Danny received the email: Incorrect. Ashok would only know about the other
recipients if their emails were in the "To" or "CC" fields.

S82. Ans.(d)
Sol. The correct answer is Musical Instrument Digital Interface (MIDI). MIDI is a technical standard that allows
electronic musical instruments, computers, and other related devices to communicate with each other. Unlike
traditional audio file formats, MIDI stores information about the music performance, such as pitch, tempo, and
instrument type, rather than the actual sound itself. It is widely used for music production and digital audio
workstations (DAWs).
Information Booster
1. MIDI Functionality: MIDI files store data about musical performance, such as notes played, timing, velocity, and
more. It enables the control of instruments and software synthesizers.
2. MIDI File Advantages: MIDI files are much smaller than audio files since they only contain performance data, not
sound recordings. This allows for easy manipulation and editing of music tracks.
3. Compatibility: MIDI is compatible with a wide range of devices, including synthesizers, sound cards, and
computers, making it a universal format for music production.

S83. Ans.(c)
Sol. The different types of computer networks are arranged based on their geographic coverage, from the largest to
the smallest. WAN (Wide Area Network) covers the broadest geographical area, spanning cities, countries, or even
continents. MAN (Metropolitan Area Network) is smaller, typically covering a city or a large campus, while LAN (Local
Area Network) is confined to a small area such as a single building or a small group of buildings.
Information Booster:
1. WAN (Wide Area Network): A WAN can span long distances and can connect multiple LANs or MANs. WANs often
use public communication links such as telephone lines or satellite connections.
2. MAN (Metropolitan Area Network): A MAN is used to connect multiple LANs within a city or a campus, offering
high-speed data transfer across short to medium distances.
3. LAN (Local Area Network): A LAN typically covers a small area, such as an office, school, or home. It is the most
common type of network for personal or business use, and uses technologies such as Ethernet or Wi-Fi.

S84. Ans.(b)
Sol. A video file format is a type of file format designed for storing digital video data on computer systems or for use
on the internet. Video formats like MP4, AVI, WebM, and Ogg are commonly used for video distribution.

56 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


Information Booster:
Video Formats:
1. FLA: The .FLA format is primarily used by Adobe Animate (previously Macromedia Flash). It is a project file format
used for creating interactive multimedia, vector graphics, and animations.
While .FLA files are not standalone video files, they are used to design animations and content that can eventually be
exported as video. Hence, they can be considered appropriate for distributing video in certain contexts.
Conclusion: Appropriate for distributing video files.
2. AVI: AVI (Audio Video Interleave) is a multimedia container format introduced by Microsoft. It supports
synchronous playback of audio and video and is widely used for distributing videos over the internet.
Conclusion: Appropriate for distributing video files.
Non-Video Formats:
1. MP3: MP3 (MPEG-1 Audio Layer 3) is a digital audio format designed for compressing and distributing audio, not
video.
Conclusion: Not appropriate for distributing video files.
2. WMA: WMA (Windows Media Audio) is an audio file format developed by Microsoft. It is specifically designed for
audio playback and storage, not for video.
Conclusion: Not appropriate for distributing video files.
3. AIF: AIF (Audio Interchange File Format) is a standard audio file format developed by Apple. It is used for storing
uncompressed high-quality audio, not video.
Conclusion: Not appropriate for distributing video files.
Based on the analysis, the formats appropriate for distributing video files are:
(A) .FLA: Suitable for animation-based video projects.
(E) .AVI: A widely used multimedia container for video distribution.
Correct Option:
(b) (A) and (E) only
Additional Knowledge:
FLA File Format: Used by Adobe Animate to design vector graphics and animations for TV, web, and games. Though
not directly a video format, it can lead to video outputs.
AVI File Format: A well-established video format supporting both audio and video, making it ideal for internet video
distribution.
Other formats like MP4, WebM, and Ogg are also popular for internet-based video streaming, with compatibility in
HTML5.

S85. Ans.(b)
Sol. The correct matching of the file extensions and their respective types is as follows:
1. mp3 corresponds to music (audio file format).
2. xls corresponds to a spreadsheet (Excel file format).
3. jpeg corresponds to image (a common image file format).
4. mdb corresponds to database (Microsoft Access database file).
Information Booster:
1. .mp3 (Music): MP3 is an audio format used for storing music or audio files in a compressed format. It's widely
used for music distribution. It allows for efficient compression without significant loss of audio quality, making it
ideal for sharing and streaming music. .mp3 is used specifically for storing music or audio files. It's not an image,
spreadsheet, or database file.

57 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


2. .xls (Spreadsheet): XLS is the file extension for Microsoft Excel spreadsheet files. Used for creating tables, storing
data, performing calculations, and creating graphs. The XLS format is a binary file format used in older versions of
Excel; newer versions of Excel use .xlsx.
3. .jpeg (Image): JPEG (Joint Photographic Experts Group) is a commonly used format for digital images, particularly
in photography and web use. It uses lossy compression to reduce file size while maintaining visual quality, though
some quality may be lost in the compression process. While .jpeg is indeed an image format, it is not associated with
a spreadsheet, database, or music, which is why it does not match the other options in the list.
4. .mdb (Database): MDB stands for Microsoft Database and is used by Microsoft Access to store data in a database
format. MDB files store data in tables, and they can include queries, forms, and reports, making them a fully functional
database format used in smaller-scale database applications. .mdb files are used for databases, specifically with
Microsoft Access. They do not represent music, images, or spreadsheets.

S86. Ans.(b)
Sol. Statement (I) is false because a DVD-ROM is a read-only optical storage medium that cannot be written to
multiple times.
Statement (II) is false because software is loaded from secondary storage (not from RAM) and then executed by the
CPU. RAM temporarily holds data that is actively being processed, while secondary storage is where the software is
stored long-term before it is executed.
Information Booster:
1. DVD-ROM: A DVD-ROM (Read-Only Memory) cannot be written to; it is only read, making Statement (I) false. A
DVD-RW (Rewritable) is the type that allows writing and rewriting.
2. Secondary Storage and RAM: Software is stored on secondary storage (e.g., hard disk) and loaded into RAM when
required for execution by the CPU. RAM is temporary, while secondary storage is permanent.
3. RAM's Role in Execution: RAM is used for storing data temporarily while it's being actively used by the computer,
not for storing software itself.

S87. Ans.(b)
Sol. Open-source software is defined by the fact that its source code is made available to the public, allowing anyone
to study, modify, and distribute it. This openness encourages collaboration and innovation within the community.
While many open-source software programs are free to use, the core defining feature is the accessibility of the source
code, not necessarily the price.
Information Booster:
1. Definition of Open Source: Open-source software refers to any software where the original source code is made
available to users, allowing them to view, modify, and distribute it under certain licensing terms.
2. Licenses and Terms: Open-source software is typically released under licenses such as GNU General Public
License (GPL), MIT License, and Apache License that govern how the software can be used, modified, and
redistributed.
3. Examples of Open Source Software: Examples of open-source software include the Linux operating system,
Mozilla Firefox browser, and the Apache HTTP Server.
4. Benefits of Open Source: Open source promotes transparency, community-driven development, and security
because multiple developers can audit and improve the software.

S88. Ans.(a)
Sol. Social engineering is a form of cyber-attack that manipulates individuals into divulging confidential information
by exploiting their trust. It often involves tricking people into revealing passwords, security codes, or other private
data by creating a sense of urgency or by pretending to be someone in a position of authority. This attack is
particularly dangerous because it targets human vulnerabilities rather than technical weaknesses.
58 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
Information Booster
1. Social Engineering Tactics: Common methods include phishing, pretexting, baiting, and tailgating. Phishing is
one of the most common forms, where attackers send fraudulent emails to deceive individuals into revealing personal
information.
2. Psychological Manipulation: Social engineers use various psychological techniques, such as urgency, fear, or
creating a false sense of security, to get individuals to act without thinking.
3. Prevention: Educating users about security protocols and the risks of unsolicited requests for sensitive
information is crucial in defending against social engineering attacks.
Additional Knowledge
• Trojan Horse: A type of malicious software that misrepresents itself as a legitimate program to trick users into
installing it, but it does not involve manipulating individuals for information.
• Password Crack: This refers to the process of attempting to guess or recover a password using various techniques
such as brute force, dictionary attacks, or rainbow tables.
• Stepping-Stone Attack: This attack involves using multiple compromised systems as intermediaries to obscure
the attacker's identity and location.

S89. Ans.(b)
Sol. The correct answer is Both Statement (I) and Statement (II) are false.
Statement (I): Twitter originally allowed tweets of up to 140 characters, but this limit was increased to 280
characters in 2017.
Statement (II): While blogs generally display posts in chronological order, the earliest posts are displayed at the
bottom, not the top. This order is usually reversed, with the latest post appearing first.
Information Booster
1. Twitter's Character Limit: Initially, Twitter imposed a 140-character limit for tweets. However, this was increased
to 280 characters in 2017 to allow for more expressive posts.
2. Blogging Chronology: Blogs typically display posts in reverse chronological order, meaning the newest posts
appear first. This is to keep the content current and ensure that the most recent information is prominently
displayed.

S90. Ans.(b)
Sol. The correct answer is (B), (C) and (D) only.
RAM stores data that is actively being worked on, such as currently running programs. RAM is read-write memory,
which means users can read from and write to it during computer operations.
ROM is non-volatile and stores critical data, such as the BIOS (Basic Input/Output System) that helps start the
computer. ROM is read-only memory, which retains information even without power.
Information Booster
1. RAM (Random Access Memory): RAM is a volatile memory that loses its contents when the system is powered
off. It holds temporary data that is actively being used by the computer’s CPU.
2. ROM (Read-Only Memory): ROM is non-volatile and contains essential instructions for booting the computer,
such as the BIOS. It retains its content even when the computer is turned off.
3. Difference between RAM and ROM: RAM is designed for fast data access and is writable, whereas ROM is
permanent storage designed for critical system instructions.

S91. Ans.(c)
Sol. The correct answer is (A)-(III), (B)-(I), (C)-(IV), (D)-(II).
• Hub is a network device that connects multiple computers in a network.

59 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


• Joystick is an input device used for controlling video games or simulations.
• Notepad is a text editor that allows users to create and edit plain text.
• Android is an operating system used primarily in mobile devices.
Information Booster
1. Hub (Network Device): A hub is used to connect multiple network devices, allowing communication between
them. It operates at the physical layer of the OSI model and broadcasts data to all connected devices.
2. Joystick (Input Device): A joystick is an input device used for interacting with computers and gaming systems. It
has two or more axes of movement and is commonly used in gaming.
3. Notepad (Text Editor): Notepad is a simple text editor available in Windows that supports basic text editing
without rich formatting.
4. Android (Operating System): Android is a popular mobile operating system developed by Google for
smartphones and tablets, based on the Linux kernel.
Additional Knowledge
• Hub as an Input Device: Incorrect, as it is a network device.
• Joystick as an Operating System: Incorrect, as it is a hardware input device.

S92. Ans.(c)
Sol. The correct order is (C), (A), (B).
LAN (Local Area Network): A LAN is a network that is limited to a small geographical area, like a home, office, or
building.
MAN (Metropolitan Area Network): A MAN covers a larger area than a LAN, typically a city or large campus.
WAN (Wide Area Network): A WAN spans large geographical areas, often covering countries or continents.
Information Booster
1. LAN (Local Area Network):
• LANs are confined to a single building or a group of buildings, and they typically operate using high-speed
connections.
• Devices like computers, printers, and servers within a LAN are connected using Ethernet cables or wireless
connections.
2. MAN (Metropolitan Area Network):
• A MAN connects networks within a specific geographical area such as a city or a university campus. It can be used
to link multiple LANs.
• MANs often use fiber optic cables or leased lines from service providers.
3. WAN (Wide Area Network):
• WANs cover very large areas, like a country or even global regions. The Internet itself is an example of a WAN.
• WANs often rely on public or private data transmission services, including leased lines or satellite links.

S93. Ans.(a)
Sol. Cookies are small text files stored by web browsers on a user's device. They store data about the user's
preferences, browsing history, or login information, enabling websites to offer a more personalized experience.
Cookies help identify users and improve their web browsing experience by remembering settings or items they’ve
added to their cart.
Information Booster
1. Cookies:
• Cookies are small pieces of data stored on a user's device by websites. These files help websites "remember" a
user's actions and preferences over time.

60 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com


• Cookies are primarily used for tracking, authentication, and personalization of web experiences. For example, when
you log in to a website, cookies store your session details so you don't have to re-enter your login credentials.
2. Types of Cookies:
• Session Cookies: These are temporary and are deleted once the browser is closed.
• Persistent Cookies: These remain on the device for a set period of time and are used to store login credentials or
preferences.
3. Security Concerns: While cookies improve the browsing experience, they can also pose security risks if misused.
For example, cookies can be used for tracking user activity across different websites, which raises privacy concerns.
Additional Knowledge
• Bookmarks: A bookmark is a saved shortcut that allows you to quickly access a website, but it doesn’t store any
information about user preferences.
• Blogs: Blogs are online platforms where individuals or groups post regular updates or articles on specific topics,
but they are not related to tracking or identifying users.
• Wikis: Wikis are collaborative websites that allow multiple users to add, edit, or update content, often used for
documentation or knowledge sharing, but not related to improving browsing experiences.

S94. Ans.(a)
Sol. RFID (Radio Frequency Identification) consists of two main components: RFID tags and readers. The reader
emits radio waves via antennas and detects the signals from RFID tags. There are two types of RFID tags: passive and
active. Passive RFID tags do not have batteries and are powered by the reader's radio waves, making statement C
correct.
Information Booster
1. RFID Technology Overview:
• RFID uses electromagnetic fields to automatically identify and track tags attached to objects. Each tag contains a
unique identifier that can be read by an RFID reader.
2. Components of RFID:
• RFID Tags: These are small electronic devices that contain a microchip and an antenna. The microchip stores the
tag's information, while the antenna allows the tag to communicate with the RFID reader.
• RFID Reader: This device emits radio waves that power passive RFID tags and communicate with both passive and
active tags.
3. Types of RFID Tags:
• Passive RFID Tags: These tags do not have a battery and rely on energy received from the reader’s radio waves.
• Active RFID Tags: These tags have a battery and can transmit signals independently of the reader.

S95. Ans.(c)
Sol. The World Wide Web is the collection of all publicly accessible websites and web pages that exist on the Internet.
These websites are interconnected and use the HTTP protocol to transfer data. Therefore, the WWW is the best term
for the collection of linked information that resides on the Internet.
Information Booster
1. World Wide Web (WWW): It refers to the vast collection of interconnected web pages, multimedia, and data that
can be accessed via the Internet. The WWW uses the HyperText Transfer Protocol (HTTP) to allow communication
between clients (web browsers) and servers.
2. Functionality of WWW: Websites and web pages are linked together using hyperlinks, allowing users to navigate
easily between them. The WWW is what most people think of when they refer to "the Internet" and is a major part
of how we use the Internet daily.
61 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
3. History of WWW: The WWW was invented by Tim Berners-Lee in 1989 while working at CERN. It quickly grew
to become the primary means of accessing and sharing information on the Internet.
Additional Knowledge
• HTTP: Stands for HyperText Transfer Protocol. It is a protocol used for transferring data between a server and a
client (web browser). While essential for the operation of the WWW, it does not refer to the collection of information
itself.
• HTML: Stands for HyperText Markup Language. It is the standard language used to create and design web pages.
HTML is used to structure content on the WWW but is not a term for the collection of linked information.
• URL: Stands for Uniform Resource Locator. It is the address used to locate a resource (like a webpage) on the
Internet. URLs are used to navigate the WWW but do not represent the entire collection of information on the
Internet.

S96. Ans.(d)
Sol. When the power is turned off, volatile memory components like Processor Registers, Cache Memory, and RAM
lose all their stored data because they require power to retain information. Non-volatile memory components like
SSD and ROM retain data even when the power is off.
Information Booster
1. Processor Registers: These are small, fast storage locations within the processor. They are used to store
temporary data and instructions. Since they are volatile, they lose all data when the system is powered off.
2. Cache Memory: Cache memory is used to store frequently accessed data for quick retrieval. It is faster than RAM
but is also volatile, meaning it loses its content when the computer is turned off.
3. RAM: RAM (Random Access Memory) is used to store data that the CPU needs to access quickly. Like registers and
cache, RAM is volatile and loses its data when power is lost.
Additional Knowledge
• SSD: Solid-state drives are non-volatile storage devices, meaning they retain data even when the power is turned
off.
• ROM: Read-Only Memory is a non-volatile type of memory that stores firmware and other critical data, and retains
information without power.

S97. Ans.(b)
Sol. Cyber piracy refers to the illegal act of distributing, downloading, or copying digital content like software, movies,
or music without permission. It is considered an exacerbated crime because it exploits digital networks for
unauthorized distribution, which is more widespread and harder to control than physical piracy.
Information Booster
1. Cyber Piracy: Cyber piracy involves the illegal distribution of copyrighted content such as software, music, and
movies over the internet. This often leads to significant financial losses for the creators and distributors of digital
content.
2. How it Happens: Cyber piracy is typically done through peer-to-peer networks, illegal file-sharing websites, or by
using cracked versions of software. It also includes practices like downloading pirated copies of games or movies
from the internet.
3. Consequences: This crime can have severe economic consequences for the creative industries and can lead to
legal actions against individuals or organizations involved in piracy.
Additional Knowledge
• Cyber Vandalism: This involves defacing websites or deleting or altering data on websites without authorization.
It is a crime but doesn’t specifically involve piracy or unauthorized copying of content.
62 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com
• Cyber Stalking: This refers to the use of the internet to harass or stalk an individual. It is more of a personal crime
rather than an economic one.
• Cyber Trespass: This involves unauthorized access to someone else's computer system or network. Though illegal,
it doesn’t involve the unauthorized copying or distribution of content like piracy does.

S98. Ans.(a)
Sol. The correct matching is:
1. A (OMR) → III: Optical Mark Recognition (OMR) is used to read multiple-choice answers in exams.
2. B (MICR) → I: Magnetic Ink Character Recognition (MICR) is used by banks to read codes on cheques.
3. C (RAM) → IV: Random Access Memory (RAM) temporarily stores programs and data for quick access.
4. D (Firewall) → II: A firewall is used to prevent unauthorized access to or from a computer network.
Information Booster:
1. OMR is commonly used for grading exams like standardized tests.
2. MICR is used by banks for cheque processing and involves reading magnetic ink characters.
Additional Knowledge:
• RAM is volatile memory, meaning its contents are lost when the computer is turned off.
• A firewall can be both software and hardware, controlling incoming and outgoing network traffic.

S99. Ans.(a)
Sol. The correct order of storage capacities from largest to smallest is:
1. Yotta bytes (D)
2. Exa bytes (C)
3. Tera bytes (B)
4. Mega bytes (A)
Information Booster:
1. Yotta byte (YB) is the largest unit of digital storage.
2. The units go in this order: Kilobyte (KB), Megabyte (MB), Gigabyte (GB), Terabyte (TB), Petabyte (PB),
Exabyte (EB), Zettabyte (ZB), Yottabyte (YB).
Additional Knowledge:
1 Yottabyte = 10^24 bytes.

S100. Ans.(d)
Sol. BIOS (Basic Input/Output System) is firmware used during the booting process of a computer. It initializes
and tests the hardware components, and loads the operating system from the storage device.
Information Booster:
1. BIOS is stored on a ROM chip and helps in booting up the system.
2. It checks the system for hardware errors and loads the bootloader or operating system.
Additional Knowledge:
Modern systems use UEFI (Unified Extensible Firmware Interface) instead of BIOS, which offers faster boot times
and additional features.

63 Teaching-Jobs Exam | www.sscadda.com | www.bankersadda.com | www.adda247.com

You might also like