Information and Communication Technology
Welcome to NTA NET ASPIRANT ACADEMY
NTA NET ASPIRANT ACADEMY is a training academy for College Lectures, Assistant Professor, Research Scholar and PG Students to make qualified for Assistant Professor & JRF in UGC NET / TNSET
NTA NET ASPIRANT ACADEMY is a training academy for College Lectures, Assistant Professor, Research Scholar and PG Students to make qualified for Assistant Professor & JRF in UGC NET / TNSET
Start
Congratulations - you have completed Information and Communication Technology.
You scored %%SCORE%% out of %%TOTAL%%.
Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Question 1 |
Which one of the following represents one billion characters? Â Â Â Â Â Â Â Â Â Â Â November 2017
A | Terabytes |
B | Megabytes |
C | Kilobytes |
D | Gigabytes |
Question 1 Explanation:
A gigabyte is a unit of storage capacity that is equivalent to 1 billion bytes.
Question 2 |
VLE stands for              [21 June 2019,1st Shift]
A | Video Learning Environment |
B | Visual Learning Environment |
C | Virtual Learning Environment |
D | Visual Local Environment |
Question 2 Explanation:
VLE stands for Virtual Learning Environment. VLE is a system for delivering learning material to students via the web.
Question 3 |
Which of the following file format is not a video file format?                 [26 June 2019, 1st Shift]
A | AVI |
B | MOV |
C | MP4 |
D | JPEG |
Question 3 Explanation:
JPEG stands for "Joint Photographic Experts Group" . It is standard image format for containing lossy and compressed image data
Question 4 |
Which of the following storage devices stores maximum amount of data?                 [3 December 2019, 2nd Shift]Â
A | Compact disc |
B | Floppy disc |
C | Hard disk |
D | Magnetic optic disc |
Question 4 Explanation:
The storage devices called as Hard disk can be used to store maximum amount of data.
Question 5 |
_______ is a wireless technology built in electronic gadgets for transferring data over short distance             [4 December 2019, 1st Shift]
A | WiFi |
B | Bluetooth |
C | Modem |
D | USB |
Question 5 Explanation:
Bluetooth is a wireless communication technology that uses short - range radio signals to transmit data between two enabled devices.
1. Infrared Transmission
2. Bluetooth
3. WiFi
4. Modem
Question 6 |
Software that you can download for free, but have to pay to continue its use after a trial period is called:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â [20 June 2019, 1st Shift]
A | Public domain software |
B | freeware |
C | Open - Source Software |
D | Shareware |
Question 6 Explanation:
Shareware is a type of software that is distributed free to charge to prospective customers in a limited format.
Question 7 |
A virus type that is capable of transferring from one computer to another without any 'user interaction' is known as         [21 June 2019, 2nd Shift]
A | Worm |
B | Trojan |
C | Key logging |
D | Boot sector virus |
Question 7 Explanation:
A computer worm is self - replicating malware that duplicates itself to spread to uninfected computers.
Question 8 |
Select the option that shows the storage devices in order of capacity from lowest to longest. Â [24 June 2019, 1st Shift]
A | CD - ROM, DVD - ROM, Blu - ray |
B | Blu - ray, CD - ROM, DVD - ROM |
C | DVD - ROM, Blu - ray, CD - ROM |
D | DVD - ROM, CD - ROM, Blu - ray |
Question 9 |
A _____ is a computer program that spread by inserting copies of itself into other executable code or documents          [24 June 2019, 2nd Shift]
A | Operating System |
B | Computer Virus |
C | Firewall |
D | Anti - virus |
Question 9 Explanation:
A computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
Question 10 |
which of the following is used to create web pages?            [25 June 2019, 1st Shift]
A | HTTPP |
B | URL |
C | FTP |
D | HTML |
Question 10 Explanation:
A web page is a document commonly written in HTML that is accessible through the Internet or other networks using an internet browser.
Question 11 |
What is the full form of USB as used in Computer related activities?       [Nov 2017]
A | Ultra Security Block |
B | Universal Security Block |
C | Universal Serial Bus |
D | United Serial Bus |
Question 12 |
Which of the following statements, regarding the term ICT is/are TRUE?       [July 2018]
P:ICT is an acronym that stands for Indian Classical Technology.
Q:Converging technologies that exemplify ICT include the merging of audio-visual, telephone and computer networks through a common cabling system.
A | P only |
B | Q only |
C | P and Q |
D | Neither P nor Q |
Question 13 |
Which of the following is not considered a s a form of secondary storage?    [26 June 2019, 2 Shift]
A | RAM |
B | Floppy Disk |
C | Optical Disk |
D | Flash Drive |
Question 13 Explanation:
Ramdom Access Memory(RAM) is volatile and all the information that was stored in RAM is lost when the computer is turned off.
Question 14 |
With regard o a word processing software, the process of combining static information in a publication together with variable information in a data source to create one merged publication is called :Â Â Â Â [Jan 2017]
A | Electronic mail |
B | Data sourcing |
C | Mail merge |
D | Spam mail |
Question 14 Explanation:
Mail merge is most often used to print or email form letters to multiple recipients.
Question 15 |
Match the following: [24 Jun 2019, 2 Shift]
Set - I | Set - II |
---|---|
A. First Generation | (i) Transistor |
B. Second Generation | (ii) VLSI microprocessor |
C. Third Generation | (iii) Vacuum tube |
D. Fourth Generation | (iv) Integrated circuit |
A | (A)-(iii), (B)-(iv), (C)-(i), (D)-(ii) |
B | (A)-(iii), (B)-(i), (C)-(iv), (D)-(ii) |
C | (A)-(iii), (B)-(i), (C)-(ii), (D)-(iv) |
D | (A)-(i), (B)-(iii), (C)-(iv), (D)-(ii) |
Question 16 |
The use of Information Technology (IT) to improve the ability of Government to address the needs of society is known as _________Â Â Â Â Â Â Â Â Â Â Â Â Â Â [25th June 2019, 1st Shift]Â
A | E - business |
B | E - Administration |
C | E - Governance |
D | E - Marketing |
Question 17 |
The national agency for responding to computer security incidents as and when they occur, is                        [4th December 2019, 1st Shift]Â
A | CAT |
B | CDAC |
C | CCA |
D | ICERT |
Question 18 |
Read the following two statements:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â January 2017Â
Statement I: Information and Communication Technology (ICT) is consider a subset of Information Technology (IT).
Statement II: The 'right to use' a piece of software is termed as copyright.
Which of the above statement is / are correct?
A | Both Statement I and Statement is correct |
B | Neither Statement I nor Statement II |
C | Statement II only |
D | Statement I only |
Question 19 |
Which of the following statement is / are true respect to ICT?                                   [21st June 2019, 1st Shift]Â
P: ICT is an acronym that stands for information and competitive technology.
Q: The effective use of ICT to support learning in the inclusive education exemplifies good teaching for all learners.
A | P only |
B | Q only |
C | Both P and Q |
D | Neither P nor Q |
Question 20 |
Symbols A - F are used in which one of the following?                 December 2014
A | Binary number system |
B | Decimal number system |
C | Hexadecimal number system |
D | Octal number system |
Question 21 |
High level programming language can be converted to machine language using which of the following?                  December 2011Â
A | Oracle |
B | Compiler |
C | Mat lab |
D | Assembler |
Question 22 |
The concept of connect intelligence is derived from                     June 2006Â
A | Virtual reality |
B | Fuzzy logic |
C | Bluetooth technology |
D | Value added networks |
Question 23 |
A group's access to digital technology and another group's lack to access to it, will cause a disparity known as:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â [20th June 2019, 1st Shift]Â
A | Internet inequality |
B | Web inequality |
C | Technological imbalance |
D | Digital divide |
Question 24 |
The purpose of ICT use in education is to                          [3rd December 2019, 1st Shift]Â
A | attract students |
B | make teaching interesting |
C | optimise learning outcomes |
D | promote technology culture in teaching |
Question 25 |
which of the following is a search engine?               [25th June 2019, 1st Shift]Â
A | Flash |
B | Fire fox |
C | Internet explorer |
D | Google |
Question 26 |
Select the option that contains only optical storage media                   [5th December 2019, 1st Shift]Â
A | USB Memory stick, Blu - Ray disk, CD - ROM, DVD |
B | DVD, CD - ROM, USB Memory stick, CD - RW |
C | Hard disk, USB Memory stick, CD - ROM, DVD |
D | DVD, CD - R, Blu - Ray Disk, CD - RW |
Question 27 |
Select the option that contains exclusively the text file formats                    [6th December 2019, 1st Shift]Â
A | JPEG, MP3, RTF |
B | CSV, RTF, Txt |
C | GIF, JPEG, MP3 |
D | CSV, MP3, PDF |
Question 28 |
Which of the following devices enables a computer to transmit data over telephone lines?                                [26th June 2019, 2nd Shift]Â
A | CPU |
B | Hub |
C | Switch |
D | Modem |
Question 29 |
One Terabyte (TB) of memory is equal to:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â [24th June 2019, 2nd Shift]Â
A | 1024 KB |
B | 1024 x 1024 KB |
C | 1024 x 1024 x 1024 KB |
D | 1024 x 1024 x 1024 Bytes |
Question 30 |
What is the binary equivalent of decimal number 75?                   [21st June 2019, 2nd Shift]Â
A | 1101001 |
B | 101001 |
C | 100101 |
D | 1001011 |
Question 31 |
Which of the following is a type of malware intentionally inserted into a software system that will setoff a malicious function when specified conditions are met?                 [24th June 2019, 1st Shift]Â
A | Worm |
B | Trojan |
C | Spyware |
D | Logic bomb |
Question 32 |
Which of the following communication technologies employ only asynchronous communication?           [6th December 2019, 1st Shift]Â
A. Video Conferencing
B. Email
C. Forums
D. Instant Messaging
Choose the correct option:
A. Video Conferencing
B. Email
C. Forums
D. Instant Messaging
Choose the correct option:
A | (A) and (C) only |
B | (B) and (D) only |
C | (B) and (C) only |
D | (A) and (D) only |
Question 33 |
Which of the following is a computer based system that stores and manipulates data which are viewed from a geographical point or reference?                           [3rd December 2019, 2nd Shift]Â
A | Database system |
B | Geographical Information System |
C | Geographic System |
D | Software System |
Question 34 |
In the hypermedia database, information bits are stored in the form of                       December 2005Â
A | signals |
B | cubes |
C | nodes |
D | symbols |
Question 34 Explanation:
In the hypermedia database, the information bits are stored in the form of signals
Question 35 |
The accounting software "Tally" was developed by                    December 2008Â
A | HCL |
B | TCS |
C | Infosys |
D | Wipro |
Question 35 Explanation:
Tally is one of the best business accounting software for accounting, inventory, payroll. It is economical and one of the most popular ERP software solutions available in the industry. Tally, an accounting software was developed by the multinational company TCS - Tata Consultancy Services.
Question 36 |
Information, a combination of graphics, text, sound, video and animation is called:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â December 2008Â
A | Multiprogramme |
B | Multifact |
C | Multimedia |
D | Multiprocess |
Question 36 Explanation:
Multimedia is used for presentation medium that is typically consist of combination of text, sound, motion, video.
Question 37 |
Which one of the following is different from other members?                       June 2010
A | Google |
B | Windows |
C | Linux |
D | Mac |
Question 37 Explanation:
Google is a search engine that can be employed to find a variety of information. others are operating systems.
Question 38 |
The hexadecimal number system consists of the symbols                        December 2010Â
A | 0 - 7 |
B | 0 - 9, A - F |
C | 0 - 7, A - F |
D | 0 - 9 |
Question 38 Explanation:
Binary - 0,1
Octal Number System(0 - 7)
Decimal Number System(0-9)
Hexadecimal Number System(0-9,A-F)
Question 39 |
Video conferencing can be classified as one of the following types of communication:Â Â Â Â Â Â Â Â Â Â Â Â June 2012Â
A | Visual one way |
B | Audio - visual one way |
C | Audio - visual two way |
D | Visual two way |
Question 39 Explanation:
Audio - visual means having both sound and visual components and two - way means exchanging information between sender and receiver. Audio - visual service providers frequently offer web streaming, video conferencing and live broadcast services.
Question 40 |
________ is a protocol used by email clients to download emails to your computer.              December 2012
A | TCP |
B | FTP |
C | SMTP |
D | POP |
Question 40 Explanation:
POP is a protocol used by email clients to download emails to your computer. POP stands for Post Office Protocol.
Question 41 |
The file extension of MS - Word document in Office 2007 is                          December 2012Â
A | .PDF |
B | .DOC |
C | .DOCX |
D | .TXT |
Question 41 Explanation:
The file extension of MS - Word document in Office 2007 is .docx
Question 42 |
In computer related activities what is the full form of WORM?                    [2nd December 2019, 1st Shift]Â
A | Write On Random Memory |
B | Write on Real Memory |
C | Write Once Read Many |
D | Write Once Read Memory |
Question 42 Explanation:
WORM - Write Once Read Many. Write once read many (WORM) describes a data storage device in which information, once written, cannot be modified.
Question 43 |
Consider the following storage devices.            [2nd December 2019, 1st Shift]Â
(i) Hard disk
(ii) CD ROM
(iii) DVD ROM
Arrange these in ascending order of storage capacity and select the correct option
(ii) CD ROM
(iii) DVD ROM
Arrange these in ascending order of storage capacity and select the correct option
A | (ii), (iii) and (i) |
B | (ii), (i) and (iii) |
C | (iii), (ii) and (i) |
D | (i), (iii) and (ii) |
Question 43 Explanation:
CD ROM - 500 MB
DVD ROM - 4 GB
Hard disc - 500 GB or 1 TB
Question 44 |
Which of the following is a 'decision support system' for assisting people in taking best decisions for their children's future?                [2nd December 2019, 1st Shift]Â
A | E - Pathshala |
B | Saransh |
C | Shaalasidhdhi |
D | SWAYAM PRABHA |
Question 44 Explanation:
Saransh is a tool for comprehensive self-review and analysis for CBSE affiliated schools and parents. It enables them to analyze students' performance in order to take remedial measures. Saransh brings schools, teachers and parents closer, so that they can monitor the progress of students and help them improve their performance. It is a Central Board of Secondary Education (CBSE) initiative.
Question 45 |
Match List I with List IIÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â [2nd December 2019, 1st Shift]Â
Choose the correct answer from the options given below:
List - I | List - II |
---|---|
A. Vidwan | (i) Repository for full text thesis, e books and journals |
B. Digilocker | (ii) Education portal to facilitate learning |
C. Sakshat | (iii) Database of leading scientist / researchers |
D. Shodh Ganga | (iv) Platform for issuance and verification of documents and certificates |
A | A - i, B - iii, C - iv, D - ii |
B | A - iii, B - iv, C - ii, D - i |
C | A - iv, B - ii, C - i, D - iii |
D | A - ii, B - i, C - iii, D - iv |
Question 46 |
Satellite communication works through                        [19/11/2020, Afternoon Shift]
A | Radar |
B | Receptor |
C | Transmitter |
D | Transponder |
Question 46 Explanation:
A communications satellite is an artificial satellite that relays and amplifies radio telecommunications signals through a transponder. It basically creates a communication channel between a source transmitter and a receiver at different locations on earth. Communications satellites are used for television, telephone, radio, internet, and military applications.
Question 47 |
Which of the following is the binary equivalent of the decimal number 15?             [19/11/2020, Afternoon Shift]
A | 100001 |
B | 100101 |
C | 100011 |
D | 101001 |
Question 48 |
In IT Act 2000, which section deals with punishment for cyber terrorism?              [19/11/2020, Afternoon Shift]
A | 45 (F) |
B | 66 (B) |
C | 66 (F) |
D | 67 (B) |
Question 49 |
Which of the following number systems uses two numbers to represent data in computer?          [19/11/2020, Afternoon Shift]
A | Bicentennial |
B | Biometric |
C | Binary |
D | Byte |
Question 49 Explanation:
Binary number system is used to represents data in computer. i.e (0,1)
Question 50 |
BCD Stands for                 [19/11/2020, Morning Shift]
A | Binary Coded Decimal |
B | Binary Coded Digit |
C | Bit Coded Decimal |
D | Bit Coded Digit |
Question 50 Explanation:
In computing and electronic systems, binary-coded decimal (BCD) is a class of binary encodings of decimal numbers where each digit is represented by a fixed number of bits, usually four or eight. Sometimes, special bit patterns are used for a sign or other indications
Question 51 |
A type of memory that holds the computer startup routine is                             [11/11/2020, Afternoon Shift]
A | Cache |
B | RAM |
C | DRAM |
D | ROM |
Question 51 Explanation:
ROM is a type of memory that holds the computer startup routine
Question 52 |
Given below are two statements                      NTA NET JUNE 2021Â
Statement I: The MAC address identifies which device is connected at a given IP address.
Statement II: Mac addresses are unique to each device.
In the light of the above statements, choose the correct answer from the option given below
A | Both Statement I and Statement II are false. |
B | Both Statement I and Statement II are true. |
C | Statement I is true but Statement II is false. |
D | Statement I is false but Statement II is true. |
Question 53 |
Match List I with List IIÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â NTA NET JUNE 2021Â
Choose the correct answer from the options given below:
List - I (Types of Memory) | List - II (Fabrication Method) |
---|---|
A. Dynamic Random Access Memory (DRAM) | (i) Flip - flops |
B. Static Random Access Memory (SRAM) | (ii) Floating gate transistors and capacitors |
C. Programmable Read Only Memory(PROM) | (iii) Transistors and Capacitors |
D. Erasable Programmable Read Only Memory (EPROM) | (iv) Matrix of fuses |
A | A - ii, B - i, C - iii, D - iv |
B | A - iii, B - i, C - iv, D - ii |
C | A - iii, B - iv, C - i, D - ii |
D | A - iv, B - ii, C - i, D - iii |
Question 54 |
Which memory is used as part of the processor?                  NTA NET JUNE 2021Â
A | Hard disk |
B | RAM |
C | Registers |
D | ROM |
Question 55 |
Which of the following is a type of malware embedded in a program on a computer that will set off a malicious function when certain conditions are met?                      NTA NET JUNE 2021Â
A | Logic bomb |
B | Spyware |
C | Trojan |
D | Worm |
Question 56 |
Following are some statements regarding most of the web browsers. Choose the correct statements.              NTA NET JUNE 2021Â
A. They have a home page.
B. They do not have the ability to store users favourite pages
C. They have hyperlinks to allow users to navigate.
D. They do not keep a history of websites visited by users
Choose the correct answer from the options given below:
A | A and B only |
B | A and C only |
C | A and D only |
D | B and D only |
Question 57 |
What is blog?               NTA NET JUNE 2021Â
A | Internet |
B | Online journal |
C | Personal website in the form of journal |
D | Search engine |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 57 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!