24th Sep_2020 shift -1:

  1. Full form of abbreviation CD ROM
    1. Compact disk Read only memory
  2. Multimedia comprises of 
    1. Text, audio and Video
  3. Information and Communication Technology (ICT) comprises of
    1. Online learning
    2. Learning through mobile application
    3. Web based learning
  4. A: E-commerce companies require personal data to serve the stakeholders better
    1. R: In this process, privacy may get compromised
    2. Both A and R are correct and R is the correct explanation of A
  5. Python is a/an
    1. Programming language

24th Sep_2020 shift -2:

  1. Full form of BIOS
    1. Basic Input Output System
  2. Computer Hardware consists of 
    1. Monitor and CPU
  3. Data visualisation method
    1. pie chart and bar chat
  4. A: Nowadays many online courses are available and their popularity is increasing
    1. R: Selecting the right course from many such, is a big challenge
    2. Both A and R are correct but R is not the correct explanantion of A
  5. A-F system is used in the following number system
    1. Hexa- decimal

25th-sep-2020-shift-1:

  1. Full form of the abbreviation IoT 
    1. Internet of Things
  2. The type of memory that holds the computer startup routine
    1. ROM
  3. A: Total number of mobile users in india is increasing rapidly
    1. R: The cost of the mobile is decreasing
    2. Both A and R are correct but R is the correct explanantion of A
  4. The file extension of Microsoft (MS) Word document in office 2007 is
    1. .docx
  5. The binary number for decimal number 9?
    1. 1001

25th-sep-2020-shift-2:

  1. the full form of the abbreviation ISP
    1. Internet Service Provider
  2. The name for a webpage address
    1. URL
  3. A: Privacy and security of user data is at stake on the internet
    1. R: No steps are being taken by the user, for the security and privacy of data
    2. Both A and R correcct and R is the correct explanantion
  4. Not a system software
    1. application software, editor
      1. Those which are includes
      2. Compiler , Operating system
  5. The following is excluded from the domain of artificial intelligence
    1. text

29th-sep-shift-1:

  1. The full form of the abbreviation GIF
    1. Graphics Interchange Format
  2. The following correctly lists computer memory types from lowest to highest speed
    1. Secondary storage, Main memory, Cache memory
  3. Speed of internet is measured in Gbps
  4. A: Machine learning requires good quality and sufficient data to train and test the algorithm
    1. R: For correct classification, good quality data which is free from noise, and sufficient data is required for training and testing of the algorithm
    2. Both A and R correct and R is the correct explanation of A
  5. Using a website to pour out one’s grievances is called
    1. Cyber venting

29th-sep-shift-2:

  1. GUI stands for graphical User Interface
  2. S-1: Operating system are hardware
    1. S-2: Algorithm is a step by step procedure to solve a problem
    2. S-1 is incorrect but S-2 is true
  3. S-1: Coompilers are software
    1. S-2: Touch screen monitors are input/output device
    2. Both S-1 and S-2 are true
  4. List-1 and List-2
    1. Image – .jpeg
    2. Video – .mpeg
    3. Audio – .mp3
    4. Word processing – .doc
  5. List-1 and List -2
    1. Search engine – google.com
    2. Job openings – naukri.com
    3. e-mail – gmail.com
    4. e-commerce – amazon.com

30th-sep-shift-1:

  1. S-1: ALU stands for Arithmetic Logic Unit
    1. S-2: UPS stands for Uniform Power Source
    2. S-1 is correct but S2 is false
  2. Correct statements
    1. Internet is larger than intranet
    2. Internet is network of networks
  3. List-1 and List-2
    1. Programming language – C++
    1. Operating System – Windows XP
    2. Internet – Wide Area Network
    3. Application software – MS powerpont
  4. S-1: Example of primary memory is RAM
    1. S-2: example of secondary memory is Pen drive
    2. Both S-1 and S-2 are true
  5. The following is realted to national super computing mission of Govt of India
    1. Param shivay

30th-sep-shift-2:

  1. List-1 and List-2
    1. Web browser -Chrome
    2. Operating System – DOS
    3. Secondary memory – Hard disk
    4. Application software – MS-Word
  2. List 1 and List 2
    1. Software – Linux
    2. Hardware – Hard disk
    3. Algorithm – sstep by step procedure
    4. Data – raw facts and figures
  3. Joystick is Input device
  4. An application software is MS Word
  5. Information is Processed data

1st-oct-shift-1:

  1. The following size of computer memory in ascending order
    1. Kb>Mb>Gb>Tb
  2. S-1: Printed output from a computer system is called soft copy
    1. S-2: RAM is a read/write memory
    2. S-1 is incorrect but S-2 is true
  3. The following is not used to avail internet connectivity
    1. Scanner
      1. others are Wifi, 3g, 4 G
  4. List-1 and List-2
    1. Input device – Mouse
    2. Output device – Monitor
    3. Software – MS-office
    4. Web Browser – Chrome
  5. Radha receives an email claiming that her credit card account is about to be suspended unless she emails her credit card details and PIN(Personal Identification Number. This is an example of Phishing.

1st-oct-shift-2:

  1. RAM is placed on
    1. Motherboard
  2. The correct statements are
    1. National supercomputing Mission is a government of India initiative
    2. Param shivay is super computer
  3. S1: Cache memory is faster than random access memory
    1. S-2: Random access memory is closer to the processor than cache memory
    2. S-1 is correct but S-2 is incorrect
  4. Not a web browser – Facebook
    1. Others are Firefox, chrome, safari
  5. URL stands for
    1. Uniform resource Locator

9th Oct-shift-1:

  1. In computers a DVD ROM is
    1. an optical storage media and it can be written only once
  2. With regard to computer memory the true statements are
    1. cache memory is volatile memory
    2. RAM is volatile memory.
  3. The recycle bin is an area in windows OS that contains files deleted from the
    1. Hard drive
      1. But not in pen drive and CDROM
  4. The correct order of the computer memories on the basis of increasing memory access time ( from low to high)
    1. Registers
    2. Cache memory
    3. Main memory
    4. Secondary memory
  5. S-1: Minimum number of bits required to store any 3 digital decimal number is 10
    1. S-2: The data in a digital computer is stored in terms of bits/bytes where one PetaByte is equal to 2^50 bits
    2. S-1 is correct but S-2 is incorrect

17th-oct-shift-1:

  1. The following statements is true in respect of computers
    1. Software is loaded into RAM from secondary storage and is then executed by CPU
  2. S-1: ‘SWAYAM’ an initiative of the Government of India, aims at providing affordable and quality education to the citizens
    1. S-2: SWAYAM aims at promoting the education and health of adolescent girls
    2. Statement 1 is correct statement 2 is false
  3. A: RAM (Random Access Memory) is volatile and stores data/programs currently in use
    1. R: RAM is a storage medium that retains its contents even after the supply of electricity has been turned off
    2. A is true R is false
  4. List-1 (Computer items) and list-2 ( Description)
    1. Operating System (OS) – software that controls peripherals and allocates memory and processor time
    2. WWW- a service that runs on the internet
    3. Device driver – software that helps an OS to control a piece of hardware
    4. IP -defines network addresses and is used for routing packets
  5. Wi-Fi is short for Wireless Fidelity and it is a set of standards for using short range waves  to allow computing devices  to connect to a LAN or to the internet.

17th-oct-shift-2:

  1. Ankur recieves an email informing him that his credit card is going to be cancelled. The email advices him to click on to the provided link and sign into his online banking account to prevent this happening which he does. A week later, s.10,000 has been withdrawn from his bank account. Ankur fallen victim to A phishing scam
  2. S-1: A company wide network, close to public access, which uses internet type technology is called World wide Web
    1. S-2: Modem is a device that enables a computer to communicate over telephone lines
    2. S-1 is incorrect bt S-2 is true
  3. S-1: The value of hexadecimal number 21 is 33 in decimal number system
    1. S-2: The value of binary number 1110 is 14 in decimal number system
    2. Both S-1 and S-2 are true
  4. List-1 (Digital Initiative) and List-2( Objectives)
    1. NAD – 24*7 online storehouse of all academic awards viz.certificates, degrees etc
    2. Swayam prabha – Utilisation of satellite communication technologies for transmission of education e-contents through national channels
    3. NDL – all digital library that stores information (metadata) about different types of digital contents
    4. SWAYAM – Offers various online course for school and higher education
  5. The correct order of the following different types of storage/memory components in a computer on the bais of price per bytes of storage from most expensive to least expensive
    1. CPU cache
    2. DDR4RAM
    3. SSD
    4. HDD

4th Nov-shift-1:

  1. Microsoft Access, Oracle, and SQL are example of
    1. Relational database
  2. Operating system is an interface between
    1. User and computer
  3. Which technology is used for crypto currency?
    1. Block chain
  4. S-1: Internet is the largest information base and has become a vital part of our lives
    1. S-2: HTML is an incomplete code package that allows a user to create web pages
    2. S-1 is correct but S-2 is false
  5. Full form of the abbreviation CPS is
    1. Cyber Physical system

4th Nov-shift-2:

  1. An unsolicited e-mail message sent to many recipients at once is a
    1. Spam
  2. S-1: Operations are special symbols that are used to perform calculations, make comparisons, and check logical conditions
    1. S-2: Relational operators are used for arithmetic operations
    2. S-1 is correct but S-2 is false
  3. S-1: In peer to peer network, there is no central server instead each computer can act as a server as well as a client
    1. S-2: LAN is a computer network created for individual person
    2. S-1 is correct but S-2 is false
  4. A computer netwwork enables two or more computers to
    1. Share data and hardware resource
  5. Full form of abbreviation of OCR
    1. Optical character recognition

5th-nov-shift-1:

  1. MOODLE  is abbreviation of Modular Object oriented Dynamic learning Environment
  2. Extra browser window of commercials that open automatically on browsing web pages is called
    1. Pop-up
  3. S-1: World wide Web is not an example of client-server technology
    1. S2: FTP is a service available on the internet
    2. S-1 is incorrect but S-2 is true
  4. The following statements are true
    1. Wireless communication provides anytime, anywhere connection to both computers and telephones
    2. Mobile phones are capable of providing voice communication and also digital messaging servcie
  5. The following technologies of different computer generations in the order they have been used. Those technology which iare used from first generation are
    1. Vaccum tube
    2. Transistor
    3. Microprocessor
    4. Artificial Intelligence

5th-nov-shift-2:

  1. CDMA stands for Code division Multiple Access
  2. In display technology, CRT stands for 
    1. Cathode ray tube
  3. S-1: External hard disk is a primary memory
    1. S-2: In general, pen drives have more storage capacity than external hard disk
    2. Both S-1 and S-2 are false
  4. List-1 and List-2
    1. Web 2.0 applications – Blogs, Twitter 
    2. Search Engines – google, yahoo
    3. System softwares – Windows 8,i-OS
    4. High level languages – C++, java
  5. The following statements are true
    1. an algorithm is expressed in a graphical form known as flowchart
    2. An algorithm expressed in a programming language is called a computer program

11th-Nov-shift-1:

  1. The full form of the abbreviation ISP
    1. Internet Service Provider
  2. Bit rate
    1. Number of bits per second that can be transmitted over a network
  3. Methodology for the delivery of voice and multimedia sessions over the internet is called
    1. VoIP
  4. True about the wireless networking
    1. It is easier to expand the network
    2. data is less secured than wired system
  5. List-1 (Components of computer system) and list-2 ( Examples)
    1. output device – Printer
    2. System software – Operating system
    3. Storage device – RAM
    4. Application of software – MS-office

11th-Nov-shift-2:

  1. A type of memory that holds the computer startup routine is
    1. ROM
  2. Cloud computing has the following distinct characteristics
    1. The services is hosted on the internet
    2. It is made available by a service provider
    3. the service is fully managed by the provider
  3. A firewall is a software tool that protects
    1. Server
    2. Network
    3. Individual computer
  4. The word blog is derived from the word We blog
  5. List-1 and List-2
    1. Input – Mouse
    2. Output – Monitor
    3. Memory – Cache
    4. Software – Python

12th November shift-1:

  1. The term Plotter is best described as an output device to produce drawings and graphics.
  2. E-commerce involves buying and selling of Products and services over the Internet.
  3. Which of the following devices allows a user to copy an external document and save it in electronic form onto a computer?
    1. Scanner
  4. Which of the following is correct with respect to the size of the storage units?
    1. Terabyte < Petabyte < Exabyte < Zettabyte
  5. Assertion (A): An Intranet is a private network for sharing computing resources and information within an organizationReason
    1. (R): Intranet is private version of the Internet
    2. Both A) and R) are true but R) is not the correct explanation of A)

12th Novemebr shift-2:

  1. Number of unique combination of 0’s and 1’s can be made with 5 binary digit code
    1. 32
  2. The process through which an illegitimate website pretends to be a specific legitimate website is known as 
    1. Spoofing
  3. The keys of keyboard are called modifier keys
    1. Ctrl
    2. Shift
    3. Alt
  4. One aspect of e-governance deals with flow of information between the government and citizens. Government to citizens initiative are
    1. e-Help
    2. e-Health
  5. The portals that include the list of ‘On-line courses’
    1. swayam.gov.in
    2. nptel.ac.in

13th Nov-shift-1:

  1. Identify the correct pair 
    1. Ubuntu – Operating System
      1. Avi – file transfer protocol
      2. Excel – Word processing software
      3. HDD – Cloud storage facility
  2. BCD stands for
    1. Binary Coded decimal
  3. The following allows a phone call to be routed over network wires
    1. VOIP
  4. The following represents one billion character
    1. 1 Gigabyte
  5. Scrambling of data before transmission across a network to avoid manipulation by a third party is known as 
    1. Encryption

13th Oct shift-2:

  1. Binary  number system uses two numbers to represent data in computer
  2. Satellite communication works through
    1. Transponder
  3. The binary equivalent of the decimal number 35
    1. 100011
  4. In banking system, ATM means
    1. Automatic teller machine
  5. In IT act 2000, punishment for cyber terrorism deals with the section
    1. 66(F)
UGC NTA NET
NTA UGC NET paper-1