0% found this document useful (0 votes)
42 views

Computer Notes

This document provides information about joining an online General Knowledge (GK) channel on Telegram and downloading a related mobile app. It mentions joining the GK channel of Rakesh Jangid on Telegram to gain computer-based GK knowledge along with important questions useful for all exams. It then provides contact information to download the "GK with Rakesh Jangid" app for offline classes.

Uploaded by

rajr68160
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views

Computer Notes

This document provides information about joining an online General Knowledge (GK) channel on Telegram and downloading a related mobile app. It mentions joining the GK channel of Rakesh Jangid on Telegram to gain computer-based GK knowledge along with important questions useful for all exams. It then provides contact information to download the "GK with Rakesh Jangid" app for offline classes.

Uploaded by

rajr68160
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

vf/kd tkudkjh ds fy, Vsyhxzke pSuy tkWbu djsa

GK with RAKESH JANGID


Join Now

dEI;wVj
O;k[;kr lfgr
vfregRoiw.kZ iz'u
lHkh ijh{kkvksa ds fy, mi;ksxh

GK with
RAKESH
Jangid App
Download App @Gk with Rakesh Jangid
for Offline Classes 9983115959
¼b½ Margin that is addes to the Right side
Microsoft word is ……… software Margin when printing
¼a½ Application ¼b½ Compiler ¼c½ Margin that is added to the left side
¼c½ System ¼d½ Programming margin when printing
Ans. A ¼d½ Margin that is added to the outside of the
Which is not an edition of M.S. Word? page when printing
¼a½ NS Word 2010 Ans. A
¼b½ MS Word 1020 Which menu contains symbol option is
¼c½ MS Word 2007 MS Word?
¼d½ MS Word 2003 ¼a½ Tools ¼b½ Formet
Ans. B ¼c½ Insert ¼d½ Table
Bold, Italic, regular are known as? Ans. C
How many groups are there in Home
¼a½ Font Styles ¼b½ Word Art
Menu?
¼c½ Text Effects ¼d½ Font Effects ¼a½ 7 ¼b½ 5
Ans. A
Which can be used for quick Access to
¼c½ 4 ¼d½ 6
Ans. B
commonly used commands and tools?
Which area in MS Word is used to
¼a½ Status bar ¼b½ Title bar
enter the text?
¼c½ Tool bar ¼d½ Menu Bar ¼a½ Work Book ¼b½ Work Sheet
Ans. B
Which feature of MS word containg
¼c½ Work Space ¼d½ Sheet Book
Ans. C
portrait & landscape mode?
Press ….. to open the help window in
¼a½ Margin
MS Word.
¼b½ Page orientation ¼a½ F2 ¼b½ F1
¼c½ Page Size ¼c½ F7 ¼d½ F9
¼d½ Display Ans. B
Ans. B
What is the maximum font size you can
Super script, Outline, emboss, engrance
apply for any character?
are known as?
¼a½ 1638
¼a½ Font Styles ¼b½ Font Effects ¼b½ 16038
¼c½ Text Effects ¼d½ Word Art ¼c½ 168
Ans. B
What is the default table size in MS
¼d½ None of the above
Ans. A
Word?
What is a document outline view?
¼a½ 1 column, 2 Row
¼b½ 2 column, 2 Row ¼a½ A view with a structure of heading at
various levels?
¼c½ 1 column, 1 Row ¼b½ A view with margins & gutter
¼d½ 2 column, 1 Row ¼c½ A preview in a full screen
Ans. C
What is the purpose of Gutter margin?
¼d½ A preview with Margins
Ans. A
¼a½ Margin that is added to binding side of How will MS Word will respond in
page when printing
repeated word?
¼a½ A green wavy line under the repeated ¼a½ 65 ¼b½ 35
word. ¼c½ 45 ¼d½ 75
¼b½ A blue line under the repeated word Ans. C
¼c½ A red wavy line under the repeated word A type of indent in which the second
¼d½ None of the above and subsequent lines of a paragraph are
Ans. C indented more than the first is known as?
In MS word, a the saurus can be used ¼a½ Hanging Indent ¼b½ Sleeping Indent
to look up a ……… or a word similar in ¼c½ Jumping Indent ¼d½ None of the above
meaning? Ans. A
¼a½ Metronyon ¼b½ Homonym Which menu option in MS Word
¼c½ Synonym ¼d½ Antonym contains the Ruler option?
Ans. C ¼a½ Insert menu ¼b½ View menu
What is the default font used in MS ¼c½ Tools menu ¼d½ Formet menu
word 2007 document Ans. B
¼a½ Calibari ¼b½ Arial Single spacing in MS Word document
¼c½ Times new Roman ¼d½ Kruti dev causes ………. Point line spacing?
¼a½ Calibari ¼a½ 12 ¼b½ 10
How do u close a word document ¼c½ 14 ¼d½ 16
without closing word window? Ans. A
¼a½ Click on the close Button on the title bar MS Excel
¼b½ Click on the close command on office
menu ¼a½Cell ¼b½ Short
¼c½ Click exit on the file menu ¼c½Book ¼d½ Character
¼d½ Click on X minimize Button on the title Ans. A
bar. Explanation : Cell Sheet Book
Ans. B MS Excel Sheet Group
Which enables you to move directly to
specific location in a document? ¼a½Book ¼b½ Document
¼a½ Book marks ¼b½ Hyperlink ¼c½Cell ¼d½ None of the above
¼c½ Cross–reference ¼d½ Outlines Ans. A
Ans. A MS Excel Gray Title
What is the shortcut key for “Sub
Script’ theselected text? ¼a½ dkWye dk yscy fy[kus dh txg
¼a½ Ctrl + Shift + = ¼b½ Ctrl + = ¼b½ jkW dk uEcj fy[kys dh txg
¼c½ Shift + = ¼d½ Ctrl + = ¼c½ a o c nksuksa
Ans. B
What do you call “a collection of
¼d½ None of the above
Ans. C
character and paragraph formatting
MS Excel Column Width
commands’?
¼a½ A Template ¼b½ A Style
¼c½ A Paragraph ¼d½ none of the above ¼a½Point ¼b½ Charater
Ans. B ¼c½Inch ¼d½ Contimeter
How many columns can you insert in a Ans. B
word document in maximum? Explanation : Row Width Point
Column Width Character MS Excel Data
MS Excel Tabular Form Column Pattern
Cell Data Cell Adjust
¼a½ Area Chart ¼b½ Bar Chart
¼c½ Dough nut Chart ¼d½ Column Chart
¼a½Text to fit Ans. B
¼b½Shrink to fit Explanation :
Area Chart – Show magnitude chage in
¼c½both a and b
cartain time
¼d½None of the above Barchart – Shows data in Tabular &
Ans. B Column pattern
Excel Cell Pie Chart – round shape data
reference Dough nut – Chart shape is like ring &
¼a½ Relative ¼b½ Alsolute each ring display different data series.
¼c½ Fragranant ¼d½ Mix Column Chart – Compare various item &
change in data in time.
Ans. C
Line chart – Shows data in horizental &
Explanation : Cell verticle Axis
Reference
1. Relative - A1, A2, BZ1 etc (To provide
cell Address)
2. Absolute - $A$1, SB$1 etc (To fix the
value) ¼a½Merge Cell ¼b½ Filter
3. Mix – absolute + relative ¼c½Sorting ¼d½ Table
Excel workbook Ans. B
MS Excel Cells Filter
¼a½ Shapes and worksheet
¼b½ Worksheet and Chart
¼c½ Audio and Video ¼a½ Alt + F ¼b½ Ctrl + Shift + L
¼d½ Workbopok and Table ¼c½ Alt + Spacebar + L ¼d½ Shift + F
Ans. B Ans. B
How can you activate a cell in MS MS Excel Function
Excel? = Floor (17, 4)
¼a½ by clicking on it ¼a½ 4 ¼b½ 17
¼b½ by pressing the arrow key ¼c½ 16 ¼d½ 12
¼c½ by pressing tab key Ans. C
¼d½ All of the above Explanation : Floor Function
Ans. D
MS Excel
Font Case Syntax – Floor
¼a½ Small ¼b½ Toggle Ex. Floor (17, 4)
¼c½ Capital ¼d½ All of the above 4 × 4 = 16
Ans. D
Explanation : MS Excel Font Case
MS Excel E Row E2 Function
E7 Current date Insert
¼a½ Now ¼b½ Date
¼a½= SUM (E2 : E7) ¼c½ Today ¼d½ Time
¼b½= Add (E2 : E7) Ans. C
¼c½= SUM (E2 , E7)
¼d½both a and b Worksheet View
Ans. A
Explanation : Formula data Range ¼a½New View ¼b½ Custom View
: ¼c½Make View ¼d½ None of the above
MS Excel Ans. B
Function Explanation : Custom View
¼a½ Add () ¼b½ Count A() View
¼c½ Subtract () ¼d½ both a & C
Ans. D
MS Excel 365 Formula Row 9
Cells
Cell Address
¼a½9:9 ¼b½ =9 ¼a½Z12 ¼b½ ZA12
¼c½$3 ¼d½ $9$9 ¼c½AA12 ¼d½ AK12
Ans. A Ans. C
Explanation : Row Cell Explanation : Column : 26th = Z
Row 27th = AA
= (Row Number : Row Number) Row 12th = 12
= AA12
MS Excel Column Hide
data
Representation

¼a½Ctrl + 9 ¼b½ Ctrl + 0


¼c½Ctrl + H ¼d½ None of the above
Ans. B
¼a½Picture ¼b½ Graph
Explanation : Column Hide – Ctrl + o ¼c½Chart ¼d½ Table
Row Hide – Ctrl + 9 Ans. C
MS Excel Excel Window

¼a½ Menu bar


¼b½ Formula bar
¼a½ ¼’khV use½ ! ¼lsy jsQjsUV½ ¼c½ Title bar
¼b½ ¼lsy jsQjsUl½ ] ¼’khV use½ ¼d½ Standard Tool bar
¼c½ ¼lsy jsQjsUl½ - ¼’khV use½ Ans. B
¼d½ ¼’khV use½ % ¼lsy jsQjsUl½ MS Excel Operator
Ans. A
¼a½ 1 ¼b½ 4
¼c½3 ¼d½ 2 Presentation
Ans. B view
Explanation : Operator ¼a½4 ¼b½ 3
¼c½2 ¼d½ 1
1. Airthmatic Ans. A
2. Text Explanation : Most important for
3. Comporisen powerpoint
4. Reference Normal View editing view
MS Excel Cell Formatting
Slide sorter view slides
¼a½Pattern, Protection reforange
¼b½Font, Alignment Reading View lide Show
¼c½Number, Border powerpoint windoe Run
¼d½All of the above ukfd Full screen
Ans. D Slide Show View Slide Show
Explanation : Formet Cell Tab Full screen esa Run
Number, Alignment, Font, View, Status Bar is
Border, Fill, Patern, Protection
M.S. Power Point 2007 Presentation First Slide

¼a½.ppt ¼b½ .psd ¼a½Title Silde ¼b½ First Slide


¼c½.pptx ¼d½ .bmp ¼c½View Slide ¼d½ Main Slide
Ans. C Ans. A
Explanation : 2007 & above version pptx Power Point Presentation Slide
2003 & below .ppt Background change effect
.p&d & .bmp image formet
powerpoint

Pre
¼a½Edit ¼b½ Insert
defined
¼c½Format ¼d½ New
Ans. C
¼a½ slide ¼b½ view MS Power Point Slide Show Tab
¼c½ templete ¼d½ chart
Ans. C
Explanation : Template
¼a½ Broadcast Slide show
¼b½ From Beginning Slide show
Font, Layout, Background etc
¼c½ From Current Slide show
¼d½ Preview Slide show
Ans. A
¼a½ Åij vkSj ck,a ¼b½ dsoy nk,a Power point Presentation Slide
¼c½ dsoy ck,a ¼d½ Åij vkSj nk,sa By default page orientation
Ans. A
¼a½ Vartical ¼b½ Land scape
¼c½ portrait ¼d½ None of the above
Ans. B 2. Wide Screen 16 : 9
Explanation : Powerpoint type 3. Square 1:1
page orientation Statement
Landscape – by default
Portrait ¼a½ vki lh/ks Powerpoint Slide esa text type
Power Point Presentation Slides esa dj ldrs gSa ysfdu Tesxt Box esa type djuk
Special effect use vf/kd lqfo/kktud gSA
¼a½ Animation ¼b½ Annotations ¼b½ vki Normal, Slide Sorter, Slide Show
¼c½ Transitions ¼d½ None of the above view esa Powerpoint Pressentation ns[k ldrs
Ans. C
Explanation :
gSaA
Animation Audio & visual effect
¼c½ vki View > > Toolbards ls task pone
dks show vkSj hide dj ldrs gSaA
Transition – Slides special effect
¼d½ All of the above
Ans. A
Annotation Presentation
Explanation : powerpoint Slide
better explain use
Text type We always
need text box to type.
Explanation – Captions, Voice over
etc
Power Point default
standard layout
Insert
¼a½ Blank slide ¼a½ gSMvkmM eklVj ij
¼b½ Title & Content ¼b½ LykbM ekLVj ij
¼c½ Title Slide ¼c½ uksV~l ekLVj ij
¼d½ None of the above ¼d½ Footer ij
Ans. C
Ans. A
Power Point
Explanation : Handout master Tab
Transition effect
Presentation Appearance &
¼a½ push ¼b½ shake layout
¼c½ fade ¼d½ wipe
Ans. B
Slide Layout
Explanation : Powerpoint Multiple
Transistion effect push,
Fade, wipe, reveal, split, shape etc. ¼a½Title ¼b½ List
Power Point Slide ¼c½Animation ¼d½ Chart
Size Ans. C
M.S. powerpoint 2010
¼a½ portrait ¼b½ Standard
¼c½ Wide Screen ¼d½ Square
Ans. A
Explanation : Powerpoint type ¼a½F5 ¼b½ F2
Slide Size ¼c½F1 ¼d½ F9
Ans. A
1. Standard 4:3
Presentation Slide Text Layout Gallory – Slide layout
Size
¼a½ 92 ¼b½ 94 Presentation Gallory – Template/theme
¼c½ 96 ¼d½ 104
Ans. C Power point presentation
M.S. Powerpoint Persentatoipn Presenter
View
¼a½ Standard Bar ¼b½ Tool Bar ¼a½ Lihdj uksV~l
¼c½ Status Bar ¼d½ Menu Bar ¼b½ ehfVax fjekb.Mj
Ans. C ¼c½ usfoxs’ku
Excel Worksheet Powerpoint ¼d½ Vªkaft’ku dek.M
Presentation Ans. D
Link Powerpoint

¼a½Edit, Paste ¼b½ Edit, Paste Special ¼a½Legend ¼b½ Line


¼c½Edit, Link ¼d½ Edit, Copy ¼c½Column ¼d½ Pie
Ans. B Ans. A
Text Content Apply Software
Visual Audio Effect Object

¼a½Transition ¼b½ Wipe ¼a½link ¼b½ Object


¼c½Animation ¼d½ Dissolve ¼c½Convert ¼d½ Change
Ans. C Ans. B
Explanation : Explanation :
Annimation – Text content Object
Visual Audio effect Presentation Insert
Transition – Slides Special effect
Wipe Dissolve - Transition Slides

Slide Layout ¼a½ Menu Bar ¼b½ Current Bar


¼c½ Status Bar ¼d½ Drawing Tool Bar
¼a½ Quick Style Gallary Ans. C
¼b½ Format Gallary Explanation : Windows
¼c½ Layout Gallory Status Bar
¼d½ Layout Collection
Ans. C Slide, number title, column Number,
Explanation : Quick Styple Gallry – Zoom level, view button etc.
use word Art, text Art modify Application
Software, Microsoft Office, Suite
Format Gallory – Slides Back Ground
¼a½ Infopath ¼b½ Sway
¼c½ Visio ¼d½ Checkcheet
Ans. D ¼b½Display ‘open’ Dialog Box
Explanation Word, Excel, Powerpoint, ¼c½open ‘save’ Dialog Box
Publisher, one note, one drive, Infopath, ¼d½open ‘font’ Dialog Box
Sway, Visio – Office suit Ans. A
Office 365 MS Office Object/Text
Cloud Application Software Formatting Copy
lauch Apply Function
¼a½ 2011 ¼b½ 2014
¼c½ 2017 ¼d½ 2015 ¼a½Thesaurus ¼b½ Format Painter
Ans. A ¼c½Read Text ¼d½ Citations
MS Office Ans. B
Macro Use Explanation Format Painter –
Text/Object dh Formatting copy
¼a½ To record sound text Apply
¼b½ To Automate Repetative task
¼c½ To find file location The Saurus – Synonym find
¼d½ To record Ket storke Citation – File use Source
Ans. B Reference
Explanation Macro use Repetative
task Automate MS Word Citation
Micro Short Key = Alt + F8
Tool
Microsoft office
¼a½ ¼lksgfR;d pksjh½ To avoid plagiarism
Microsoft
¼b½ To proparly enter a quote in word file
MOS MOS Full Form
¼c½ To add more word count
¼d½ To copy the formartting of a text
¼a½Microsoft Officer Scholar
Ans. A
¼b½Microsoft office skill full Explanation Citation tool
¼c½Microsoft office specialist
¼d½Microsoft office supervision Used Source/Book Reference
Ans. C
Microsoft word line break
Page Margin
Type
¼a½ Right ¼b½ Left
¼a½ Ctrl + Enter ¼b½ Alt + Enter ¼c½ Centre ¼d½ Gutter
¼c½ Shift + Enter ¼d½ Spacebar Ans. D
Ans. C
MS Excel Last Action Repeat
Explanation
Function
Line Break = Shift + Enter
Page Break = Ctrl + Enter
MS Office Use ¼a½F4 ¼b½ F3
F2 \ ¼c½F5 ¼d½ F6
¼a½ open ‘save as’ Dialog Box Ans. A
MS Excel Active Cell Content Ans. B
Explanation Cube, Date & Time,
¼a½name box ¼b½ formula bar Engineering, Financial, Information,
Logical, Lookup & reference,
¼c½Task pane ¼d½ status bar
mathematical, Statistical, Text, Database
Ans. B
Slide Text
MS Office Copied data store
Shadow, Outline, Stylish text with
texture
¼a½ Prompt ¼b½ Clipboard
¼c½ Terminal ¼d½ Driver
¼a½ Theme ¼b½ Animation
Ans. B
¼c½ Transition ¼d½ WordArt
Ans. D
Explanation Copy data,
Presentation Open
clipboard Store
Tab left
24 item copy
Panel

MS Excel feature
¼a½ Outline ¼b½ Slides
¼c½ notes ¼d½ None of these
Ans. C
Explanation Slide Show Mode Notes
¼a½ Auto Formula ¼b½ Symbols display Presenter
¼c½ Auto Fill ¼d½ Operands Notes Notes,
Ans. C
Presentation “Bottom Panel’
Explanation Autofill option helps the
available
user in copying the formulas across the row
& columns View Computer
MS Excel Values directly Screen Slide
cell enter Presentation
¼a½ Neutral values
¼b½ Constant values ¼a½Slide sorter View
¼c½ Stable values ¼b½Slide Show View
¼d½ none of these ¼c½Notes Page View
Ans. B ¼d½None of these
Explanation Constant valuse – Ans. B
Number, Names, Data, Currency etc. MS Power point Slide Add
To give a new value – Cell reference,
Mathmatical operators and functions
Squence ¼a½ Ctrl + N ¼b½ Ctrl + O
¼a½ Constant value ¼b½ Operands ¼c½ Ctrl + M ¼d½ Ctrl + S
¼c½ Formula ¼d½ Range Ans. C
Ans. C MS power Point Standard Slide
MS Excel Type Size
Function Category ¼a½ 1 : 1 ¼b½ 4:3
¼a½ 10 ¼b½ 11 ¼c½ 16 : 9 ¼d½ None of these
¼c½ 12 ¼d½ 13 Ans. B
Explanation ¼c½ 4 ¼ d½ 5
Standard Size = 4 : 3 Ans. B
Wide Screen = 16: 9 Explanation
Square = 1 : 1
MS Power Point template/theme 1. Digital
option use 2. Analog
3. Hybrid
¼a½Presentation Gallary
¼b½Format Gallary
¼c½Quick Style Gallry ¼a½HCL – 1900 ¼b½ IBM – 1600
¼d½Layout Gallary ¼c½Intel – 4004 ¼d½ CDC - 3600
Ans. A Ans. A
Explanation Presentation Gallary = Explanation
Template theme pquus gsrq HCL1900,
Quick Style Gallary = Word Art, Text Art PDP11, IBM360, ICL2900 etc.
Modify IBM1600 & CDC 3600 – 2nd Gen.
Computer
MS Power Point Zoom% Size
Intel

¼a½ 10 ls 400 ¼b½ 10 ls 200


¼c½ 0 ls 500 ¼d½ 0 ls 400
Ans. A
Explanation ¼a½Charles Baboze
MS Power point = 10-400 Zoom% ¼b½Edward Robert
MS Excel = 10-400 ¼c½John Von Newman
MS Word = 10-500 ¼d½Allen Turning
Menu Slide Ans. D
Design, Slide Layout etc feature Explanation
Charles Babbage
¼a½Insert menu ¼b½ Tools menu Modern Computer Johan Von
¼c½Format menu ¼d½ Slide Show menu Newmann
Ans. C Allen
MS Excel Column Width Turning
Autofit option Binary Computer

¼a½ Double click on thej left edge of the ¼a½ENIAC ¼b½ Zuse
column ¼c½Pascaline ¼d½ LEO
¼b½ Right click twice on the columns edge Ans. B
¼c½ Click twice on the column header Explanation
¼d½ Both a & c Business Computer – LEO
Ans. B Binary Computer – Zuse
Mechanicle Calculator-Pascaline

¼a½ 2 ¼ b½ 3 ¼a½ PDP – 2 ¼b½ IBM 1401


¼c½Vax – 10 ¼d½ PDP-1 ¼c½ Binary System ¼d½ EBCDIC
Ans. D Ans. A
Explanation : There are two type of ASCCI
code –
1. Standard – It use 7 bit encoding system
2. Extended – It use 8 bit encoding system
¼a½ROM ¼b½ PROM (Maximum character in ASCII code is =
¼c½EPROM ¼d½ EEPROM 256)
Ans. C The word size of a typical PC’s CPU
is?
¼a½ 32 or 64 bytes ¼b½ 32 or 64 bits
¼a½ ,d Word ls ¼b½ ,d Byte ls ¼c½ 32 or 64 words ¼d½ 0 or 1 bit
¼c½ ,d Bit ls ¼d½ ,d Kilo Byte ls Ans. B
Ans. B Explanation Word Size
Explanation 1 Byte = 1 character = 8 bit Bit

¼a½Oregon ¼b½ Taxas


¼c½California ¼d½ Washington
Ans. C ¼a½Bus Device ¼b½ Prefetch unit
’ ¼c½Decode unit ¼d½ Writeback
Ans. B
Insert Computer date, time and Calender
Hybrid
¼a½Register
¼a½Network ¼b½Flash Memory
¼b½Embedded Software ¼c½CMOS Chip
¼c½Firmware ¼d½Cache Memory
¼d½Canned Program Ans. C
Ans. C Explanation % Computer date, time and
Explanation Firmware – Washing Calender Collect
machine, Microwave, Air Fresner etc. Memory CMOS Chip BIOS

Bar Cache Reader


¼a½ A Recordable CD
¼b½RAM ¼a½UPC1 ¼b½ UPC2
¼c½Hard Drive ¼c½POS1 ¼d½ Optical Marks
¼d½DVD Drive Ans. A
Ans. B Explanation UPC (Universal Product
Keyboard each character Code) is a barcode symbol that is used
Represent world wide to track trade items in stores.
Display Size
¼a½ ASCII ¼b½ Unicode
¼a½Diagonally ¼b½ Horizontally ¼a½Bit rate ¼b½ Transfer rate
¼c½Vertically ¼d½ Parallelly ¼c½Baud Rate ¼d½ Byte Rate
Ans. A Ans. C
��� ����
Computer Explanation ���� ���� �
��. �� ���
The CPU of a computer ………..?
¼a½ Understands only assembly language
¼a½ USB Play ¼b½ Understands machine language and high
¼b½ USB Swapping level languages
¼c½ Attachment ¼c½ Understands only high level language
¼d½ Plug N Play ¼d½ Understands only machine language.
Ans. D Ans. D
FHD Resoluation is? ALU
¼a½ 1920 × 1080 ¼b½ 1280 × 720
¼c½ 16 : 9 ¼d½ 3840 × 2160 ¼a½ ROM ¼b½ Registers
Ans. A ¼c½ Control Unit ¼d½ CPU
Explanation Ans. B
FHD Display = 1920 × 1280 Explanation
HD Display = 1280 × 720 Memory register Cache
4K Display = 3840 × 2160
Memory Instruction
Frame Buffer
¼a½ Printer ¼b½ Moniter 124- One megabyte is?
¼c½ ROM ¼d½ CPU ¼a½ 1048576 bytes ¼b½ 102756 bytes
Ans. B ¼c½ 121046 bytes ¼d½ 81000 bytes
Ans. A
Explanation Show
Explanation 1MB = 1024 KB
Frame Frame
= 1024 × 1024 byte
Buffer = 1048576 bytes
Audio Device – Input, Output & Storage
Video Data Port 125- Hard Disk dh og lajpuk ftl ij
lHkh read/write head ,d Hkqtk ij da/ksuqek esa
¼a½USB ¼b½ VGA yxs jgrs gS dgykrh gS\
¼c½HDMI ¼d½ Ps/2 ¼a½ Spindle ¼b½ Platter
Ans. C
¼c½ Track ¼d½ Acress Arm
Hard Disk tracks divide Ans. D
Further Subdivide Explanation Platter
Tracks Platter, Spindle
¼a½Clusters ¼b½Vectors Mount Platter
¼c½Heads ¼d½ Sector read/write head, Access Arm
Ans. D
126- The input, output and storages device are
known as?
¼a½ Peripheral devices
¼b½ Secondary storage devices
¼c½ Firm ware 130- fuEu fyf[kr esa ls dkSu ,d ukWu
¼d½ Hardware drives buiSDV fizUVj dk mnkgj.k ugha gS\
Ans. A ¼a½ Inkjet ¼b½ Laser
Explanation Input, output & Storage ¼c½ Plotter ¼d½ Daisy Wheel
Device Peripheral device Ans. D
device Explanation example of Impact Printer =
Computer Laser, Inkjet, Plotter
127- Hard Disk drives, DVD drives and Example of Non Impact Printer = Dot
Matrik
Floopy drives …… LVksjt s ds lHkh :i gS & Daisy Wheel, Chain Printer, band printer,
¼a½ Primary or temporary Drum Printer etc.
¼b½ Secondary or Temporary 131- Drum Printer dh xfr ekih tkrh gS\
¼c½ Secendary or permanent ¼a½ CPM ¼b½ LPM
¼d½ All of the above ¼c½ PPM ¼d½ DPI
Ans. C Ans. B
Explanation Hard Disk, DVD, Floopy Explanation Drum Printer Line
Drive – Secondary Permanent Printer Line Per
Storage Minute
128- pqcdh; fMLd Mªkbo ds foijhr] 132- GPD dk iw.kZ :i gS &
pqacdh; Vsi dks i<+k tkrk gS\ ¼a½ Gas Plasma Desktop
¼a½ Randomly ¼b½ Gas Plate Display moniter
¼b½ Through a laser beam ¼c½ Gas Plasma Display Moniter
¼c½ Poraelaly ¼d½ Gas Plate Desktop
¼d½ Sequentially Ans. C
Ans. D Explanation GPD - Gas Plasma Display
Explanation Magnetic disk Moniter
Randomly Access 132- CRT dh vkUrfjd lrg ysfir jgrh
Magentic Tape Sequentially gS\
Access ¼a½ dSfY’k;e inkFkZ
129- dhcksMZ dh ,d gh dqath dks nck dj ¼b½ vk;ju vkWDlkbM
j[kk tk, rks dhcksMZ esa ,d gh dwath ds ¼c½ fØLVu inkFkZ
ladsr dEI;wVj esa izfo’V djrk tk,xk ;g ¼d½ QkWLQksjl inkFkZ
typematic dgykrk gSA bl Typematic dh Ans. D
nj gS\ 133- CRT Moniter dh Refreash nj gksrh
¼a½ 5 ckj izfr lSds.M gS\
¼b½ 100 ckj izfr lSds.M ¼a½ 15 ckj izfr lSds.M
¼c½ 10 ckj izfr lSds.M ¼b½ 100 ckj izfr lSds.M
¼d½ 20 ckj izfr lSds.M ¼c½ 30 ckj izfr lSds.M
Ans. C ¼d½ 10 ckj izfr lSds.M
Explanation Tymatic Ans. C
Explanation Cathode Roy Tube Moniter ¼d½ The memory and I/O devices have an
Refresh associated address space
Ans. B
134- DVD esa CD dh vis{kk fdrus xq.kk Explanation Memory mapped I/O
vf/kd MsVk laxzfgr fd;k tk ldrk gS\ device device Input-
¼a½ 7-5 xquk ¼b½ 10 xquk Output Memory same Address space
¼c½ 4-5 xquk ¼d½ 3 xquk share
Ans. A 139- izFke Commercial Hard Disk Drive dk
135- CD-ROM/Compact Disk esa Data dks uke Fkk\
Read/Write fd;k tkrk gS\ ¼a½ RAMPT ¼b½ DARAM
¼a½ ijkScaxuh fdj.kksa ls ¼c½ SARAM ¼d½ RAMAC
¼b½ ystj fdj.kksa ls Ans. D
¼c½ uhys izdk’k ls 140- dEI;wVj dh nwljh ih<+h esa fdl
¼d½ ifjofrZr fdj.ksa ls laxzg.k ;qfDr dk iz;ksx fd;k tkrk Fkk\
Ans. B ¼a½ eSXusfVd Mªe ¼b½ VªkaftLVj
Explanation CD-ROM/Compact disk ¼c½ eSXusfVd Vsi ¼d½ ¶ykWih fMLd
Data Laser Ans. C
Read/Write Explanation
1st Generation – Magnetic drum
136- LVksjst fMokbl dk eq[; QksyMj D;k 2nd Generation – Magnetic tape
gS\ 3rd Generation – Magnetic disk (Floopy)
¼a½ Interface ¼b½ Device Driver 4th Generation – Magnetic disk (Hard Disk)
¼c½ Root Directly ¼d½ Platform 141- fuEufyf[kr esa ls fdls Input-Output
Ans. C Device dk la;kstu dgk tkrk gS\
Explanation Storage Device Main ¼a½ VDT ¼b½ Parallel device
Folder Root Directory ¼c½ Simulater ¼d½ None of these
137- MsVk LVksjst dk lgh inkuqØe gS & Ans. A
¼a½ Bits, Bytes, Records, Fields, Files, Explanation Input-Output device
Database Visual/Video Display terminal
¼b½ Character, Fields, Records, Files,
Database 142- fuEufyf[kr esa ls dkSulk Input device
¼c½ Bytes, Records. Fields, Files, Database User – programmable gS\
¼d½ Bit, Bytes, Fields, Recod, files, database ¼a½ Dumb terminal
Ans. D
Explanation Bit, Bytes, Fields, Recod,
¼b½ Smart terminal
files, database
¼c½ VDT
138- eSeksjh & eSIM I/O esa ---------- ¼d½ Intelligent terminal
Ans. D
¼a½ The I/O devices have a separate address
Explanation Intalligent Terminal
space
¼b½ The I/O devices and memory share the Terminal User
same Address space Programme
¼c½ A part of the meomory is specifically set
aside for the I/O operations
143- The computer memory holds data & ¼d½ Both b & c
……. Ans. D
¼a½ bytes ¼b½ memory Explanation Exmples of Input device-
¼c½ registers ¼d½ bits mouse keyboard-Joystick, lightpen,
Ans. B scanner, Trackball, Touch screen,
144- Key board ds Numeric Key pad esa microphone etc.
dqaft;ksa dh la[;k gksrh gS\ Computer execute
¼a½ 15 ¼b½ 16 Instruction
¼c½ 17 ¼d½ 18 Specific Task
Ans. C
145- dkSulk Software Scan fd, x, Text ¼a½Operating System
dks editable text esa vuqokfnr dj ldrk gS\ ¼b½Algorithm
¼a½ OCS ¼b½ OCR ¼c½Program
¼c½ ORC ¼d½ ORS ¼d½Instruction
Ans. B Ans. C
Explanation Optical Character Reader
Text Scan Editable Operating System
Format Translate ¼a½ Oracle ¼b½ Bada
146- Object dh Properties dks ,Dlls djus ¼c½ Android ¼d½ Windows
ds fy, Use dh tkus okyh Mouse Technique Ans. A
gS\ Explanation Oracle database
¼a½dragging ¼b½ dropping
¼c½Right Click ¼d½ left click
Ans. C Operating System Function
Explanation Object, Folder, ¼a½ Resource Allocation
ICON Properties ¼b½ Data Validation
Mouse Object ¼c½ Device Management
Right Click ¼d½ File Management
147- Qwerty Keyboard dk vkfo’dkj fdlus Ans. B
fd;k\ Explanation Operating System
¼a½ Christopher sholes Function Process Management,
Memory Management, Device Manage, I/O
¼b½ Dougles Angelbort managament, Resource Allocation, File
¼c½ Marie Jacquard Manage, Security
¼d½ Robert Leki 152- ;fn Processing esa yxus okyk CPU
Ans. A Time, i/o ij yxus okys time ls de gSA rks
148- fuEufyf[kr esa ls dkSulk lewg dsoy og Process dgykrk gSA
buiqV fMokbl gS\ ¼a½ I/O Bound ¼b½ Burts Pound
¼a½ Mouse, Keyboard, Moniter, Joystick, ¼c½ CPU Bound ¼d½ Process Bound
Lightpen
Ans. A
¼b½ Mouse, Keyboard, Scanner, Lightpen Operating System CPU
¼c½ Trackball, Touch Screen, Microphone, Idleness highest
Keyboard
¼a½Batch O.S.
¼b½Multi Programming Fundamental Process State
¼c½Multi Processing ¼a½ wait & block ¼b½ Termination
¼d½Multi Computer ¼c½ New ¼d½ Ready
Ans. A Ans. A
Explanation Explanation : Fundamental Process State 4
New, ready, Run, Termination
Till Final Execution Active Entity is -
Idleness highest ¼a½ Process ¼b½ Program
Operating System each ¼c½ Files ¼d½ Memory
process Fix time quanta Ans. A
Explanation Process Ram
¼a½ Multi tasking O.S. Store Active Entity
¼b½ Real time Operating System
¼c½ Multi Progarmming O.S. Long Term Schedular
¼d½ Distributed O.S. maximum no. of process Ready state
Ans. A
Explanation Multasking Operating ¼a½Multi Processing
System Round Robin Algo ¼b½Multi Programming
each process Time ¼c½Multi Computing
limit Set ¼d½Multi Tasking
Operating System Ans. B
Computer Cantral Server Short Tem Schedular State
Task Perform
¼a½ Embedded system ¼a½ Run - Wait/Block
¼b½ Multi computer O.S. ¼b½ New – Ready
¼c½ Distributed O.S. ¼c½ Ready – Run
¼d½ Batch O.S. ¼d½ Hard Disk – New
Ans. C Ans. C
Operating System Primary Goal Process State Secondary
Memory
¼a½ Cost effective ¼b½ easy to use ¼a½ Ready ¼b½ New
¼c½ efficiency ¼d½ security ¼c½ Suspend Ready ¼d½ Suspend Wait
Ans. B Ans. A
Explanation : Operating Primary Goal – Explanation : Secondary memory Process
easy to use secondry Goal – Cost effectivem state’s new, suspend Ready, Suspent Wait.
efficienes Security. 163- vlR; dFku NkafV, &
157- Multi User – Multitasking operating ¼a½ CPU Scheduleing, CPU Utilzation dks
system dk mnkgj.k gS\ c<+krk gSA
¼a½ Windows Vista ¼b½ M.S. Dos ¼b½ CPU Scheduleing ds ek/;e ls Average
¼c½ Windows 98 ¼d½ Palm O.S. Wating Time dks ?kVk;k tkrk gSA
Ans. A
¼c½ CPU Scheduling, System throughput Dead
increase djrh gSA Lock Necessary Contidion
¼d½ CPU Scheduling ds ek/;e ls CPU
Idleness dks c<+k;k tkrk gSA ¼a½Hold & Wait
Ans. D ¼b½No premption
Explanation CPU Scheduling, CPU ¼c½Mutual Exclusion
idleness Overall d Multiple Instance
Performance Increase Ans. D
CPU processing
time Page Replacement Algorithem
¼a½ Burst Time ¼a½ SJF ¼b½ FIFO
¼b½ Completion Time ¼c½ MRU ¼d½ Optimal
¼c½ Response Time Ans. A
¼d½ Turn Around Time Explanation Shortext Job First (SJF)
Ans. A CPU Scheduling Algo
Dispatcher 1 process CPU Utilization
Process ¼a½ Thread ¼b½ BIOs
¼c½ Kernal ¼d½ Shell
¼a½Turn Around Time Ans. A
¼b½Time Bound Explanation : Threat Light Weight
¼c½Dispatch Latancy Process CPU Utilization
¼d½Dispatch Switching
Ans. C 171- Hot Booting dgykrh gS &
CPU ¼a½ can flLVe dks fjLVkVZ djuk
Scheduling Type ¼b½ vkWijsfVax fllVe dks lSds.Mjh eSeksjh esa
¼a½ FCFS ¼b½ Round Robin yksM djuk
¼c½ FIFO ¼d½ SJF ¼c½ ,d Process dks Resource Allocate
Ans. C djukA
Explanation FIFO age ¼d½ pkyq System dks Restart djuk
Replacement Algo Type Ans. D
Fork System Call Operating System
process Memory, File, Peripheral Device
¼a½ New Process ¼b½ Parent Process Manage
¼c½ Child Process ¼d½ Fork Process ¼a½ Windows defender
Ans. C ¼b½ Kenral
Explanation : Fork System Call ¼c½ Thread
Process Child Process ¼d½ Shell
Ans. B
No of Child Process = 2 n- 1 Real Time Operating System Soft
Where n = No. of Forks – miner delay
¼a½ Airline
¼b½ Bank Application ¼d½by scanning the iris
¼c½ Missile Ans. C
¼d½ A o C nksuksa Inkjet Printer
Ans. B
Explanation : Missle Airline, Real ¼a½Thermal Communication
Time Operating System Hard Minor ¼b½Fuel Communication
Delay ¼c½Electronic Communication
Window Management ¼d½Droplet Communication
Dgorithm Ans. D
¼a½ Beltman – Ford Alorithm Computer Axis
¼b½ Dijkstra alorithm Control Logic
¼c½ Flad – Find Alorithm
¼d½ Robin – Kerringtam Alorithm
Ans. D ¼a½Printer ¼b½ Disk Drive
Interrupt ¼c½Mouse ¼d½ Network Card
¼a½ Process dks LFkfxr djuk vkSj dqN vU; Ans. B
Process dks “kq: djukA Explanation Access Control Logic
¼b½ flLVe lalk/kuksa dh mi;ksfxrk dks Driver Disk Drive
ewY;kadu djukA
¼c½ ,d Process dks mldh fo’ks’krkvksa ds
vk/kkj ij oxhZÑr djukA
¼d½ ,d Process ds fu;a=.k dks nwljs Process
dks lkSiauk Computer
Ans. D
Process Control Block ¼a½ ekml ¼b½ dh&cksMZ
¼c½ LdSuj ¼d½ VpLØhu
¼a½Process dh orZeku fLFkfr Ans. B
¼b½Process ds izkFkfedrk Lrj
¼c½Process ds Program Counter
¼d½Process ds izfØ;k lanHkZ ¼a½ VpiSM ¼b½ ckjdksM LdSuj
Ans. D ¼c½ tkW;fLVd ¼d½ uacjiSM
Explanation PCB Ans. B
Interlace Resolution
Process ¼a½ Ability to mosaic a specified number of
Process pixels
Process Program Counter ¼b½ Ability to specify the size of a pixel
Optical Mouse ¼c½ Capable of referesh rate of moniter with a
transformer
¼a½ by reading the coorinates of the biometric
data
¼d½ The ability to split the video picture into
two parts
¼b½ by using deep laser Ans. D
¼c½ by using photodiode
Explanation Interlaced Resolution ¼c½ Text dks ,d lsy ls nwljh tsy esa dkWih
Videos djuk
Interlaced ¼d½ Text String dks ,d lsy esa nwljs lsy esa
Display foHkkftr djukA
IFPD Ans. A
Explanation Concatenate Function
¼a½ Nk;kfp=ksa dks iznf’kZr djus ds fy, Cell Data
¼b½ Li’V n`’; dh xq.koŸkk ds fy, Represent
¼c½ VpLØhu vkSj baVjSfDVo O;kogkfjdrk ds MS Excel Pivot Table
fy, ¼a½ ,d lsy dh ekU;rk dh tkap djrk gSA
¼d½ cf<+;k lkefjd lqfuf’pr djus ds fy, ¼b½ MsVk dks lapkfyr djus okys ,Dlizs’ku
Ans. C dh ekU;rk dh tkap djrk gSA
Outboard Readundant Aray of ¼c½ MsVk dks O;k[;k djus vkSj fo’ys’k.k esa
Independent Disks, ORAID mi;ksxh gSA
¼a½ ,d fo’ks’k rjhds ls laxzfgr fd, x, ¼d½ MsVk dks xzkfQdy :i esa iznf’kZ djrk
MkVk dk laxzg flLVe gSA
¼b½ ,d usVodZ ij MsVk laxzfgr djus okyk Ans. C
midj.k MS Word Table of Authorities
¼c½ ,d cM+s laxBu esa MsVk vuqdwyu ds
fy, mi;ksx gksus okyk ¼midj.k½
¼d½ ,d mPp {kerk okyh loZj laxzg bZdkbZ ¼a½ vnkyrksa laKkukRRed uohure fu.kZ;ksa
Ans. A dh lwph
¼b½ okD;ksa vkSj “kCnksa ds fy, fo’ks’k LVkby
Operating System dh lwph
¼c½ nLrkost esa Citations dh lwph
¼a½Window 10 ¼b½ Linux ¼d½ External Source ls Bi bilography dh
¼c½Mac OS ¼d½ Android lqfo/kk iznku djrk gSA
Ans. C Ans. C
MS Word Mailing Tab

¼a½ ^Envelope^ vkSj ^Labels^


Operating Systerm ¼b½ ^Styles^ rFkk ^Themes^
¼a½ Multitasking OS ¼b½ Embedded OS ¼c½ ^Page Setup^ rFkk ^Print Preview^
¼c½ Real Time OS ¼d½ Network OS ¼d½ ^Find^ rFkk ^replace^
Ans. C Ans. A
MS Excel Concatenate Function MS Word Smart Art

¼a½ nks lsyksa esa MkVk dks tksM+dj ,d lsy esa ¼a½ Object vkSj Text Template dh lwph
iznf’kZr djukA ¼b½ xzkfQdy :i ls tkudkjh dks iznf’kZr
¼b½ ,d lsy esa VsDLV fLVªax dh yEckbZ dh djus ds fy,
x.kuk djuk ¼c½ rkfydkvksa vkSj pkVksZa dk laxzg.k
¼d½replication esa mi;ksxh gSA
Ans. B
MS Powerpoint Slide Master Computer

¼a½ izR;sd LykbM ds fy, lanHkZ eku dh ¼a½Track


laxzfgr lwph ¼b½Sector Number
¼b½ Slide Show ds fy, Lo:i] <kapk vkSj ¼c½Surface Number
rkfydk dh laxzfgr lwph ¼d½All of the above
¼c½ ubZ Slides dk laxzg Ans. D 198- fo’o dk igyk ySiVkWi cktkj
¼d½ Slide Show ds fy, iwoZ fu/kkZfjr yksxksa esa dc vkSj fdlds }kjk yk;k x;k\
vkSj izrhdksa dh laxzfgr lwph ¼a½ Hewlett – packard, 1980
Ans. B ¼b½ Epson, 1981
Powerpoint ¼c½ Laplink, 1982
Presentation View ¼d½ Tandy, 1985
Customize Ans. B
HTTP
¼a½Insert Timing ¼b½ View Timing ¼a½ Hyper text Transport Protocol
¼c½Reherse Timing ¼d½ Timing Pane ¼b½ Hyper Text Transfer Protocol
Ans. C ¼c½ Hyper Text Transmission Protocol
Explanation Reherse Timing ¼d½ Hyper Text Tracking Protocol
Ans. B
Slide Top
Level Domain
¼a½ .com ¼b½ .net
¼c½ .gov ¼d½ .web
Ans. D
¼a½ izFke ¼b½ f}rh; Explanation .web Top level
¼c½ r`rh; ¼d½ prqFkZ domain Propose
Ans. B Officially
System Administrator
Domain Name System (DNS)
¼a½CPU ¼b½ ALU
¼c½CU ¼d½ MMU ¼a½ To encrpt data transmitted over the
a CPU Internet
Computer EBCDIC ¼b½ To convert domain names into IP address
8 Bit Code ¼c½ To secure websites with SSL certificates
¼a½ feuh dEI;wVj ¼b½ ekbØks dEI;wVj ¼d½ To control internet tropic and bandwidth
¼c½ esuÝse dEI;wVj ¼d½ lqij dEI;wVj Ans. B
Ans. C
Explanation Domain Name IP Ans. B
Address DNS Internet Protocol
IP
Address Web
email Page Browse
¼a½ DNSSEC ¼b½ IP Sec
¼a½ SMTP ¼b½ FTP ¼c½ HTTPS ¼d½ TOR
¼c½ POP3 ¼d½ HTTP Ans. D
Ans. C Explanation TOR – The domain Router
Standard Domain name Top CAPTCHA
level Domain allowed ¼a½ To verify the authencvity of a websites
maximum character SSl certificate
¼a½ 63 ¼b½ 128 ¼b½ To prevent automated bats from accessing
certain online services
¼c½ 256 ¼d½ 512
Ans. A
¼c½ To encrupt emails sent over the internet
IP Address ¼d½ To speed up webpage loading times
Ans. B
Internet

¼a½IETF ¼b½ IANA


¼a½Byte ¼b½ Megabyte
¼c½ICANN ¼d½ IEEE
Ans. B
¼c½Gigabyte ¼d½ Bit
Ans. D
Explanation IANA – Internet Assigned
Internet Download
Numbers Authority
Internet Cookie
¼a½ Process of sending data to remote server
¼a½ A small text file stored on a user’s ¼b½ Process of receiving data from a remote
computer to track websites visits and server
preferences ¼c½ Process of gathering information from
¼b½ A piece of Hardware that connect a Internet
computer to the Internet ¼d½ Process of capture images from Internet
¼c½ A type of encrption used in secure online Ans. B
transaction Web Browser User
¼d½ A program that detects and removes Privacy User Data
malware from web browsors Track
Ans. A
Multiple devices ¼a½Microsoft edge ¼b½ opera
Public IP Address ¼c½Mozila firefox ¼d½ porace
Ans. D
¼a½ IP Spoofing Larry Page Sergey brin
¼b½ Network Address Translation
¼c½ MAC Filtering ¼a½ Bing ¼b½ Yahoo
¼d½ Port Forwarding ¼c½ Google ¼d½ Duck Duck Go
Ans. C email Paul Buchheit
Search engine, Search result
rank Page rank Google
algorithm ¼a½ Yahoo mail ¼b½ Hot mail
¼a½ Bing ¼b½ Yahoo ¼c½ Outlook ¼d½ Gmail
¼c½ Google ¼d½ Duck Duck Go Ans. D
Ans. C email EML Term
email refer
attachments maximum Size Limit ¼a½ Encrpted email link
¼b½ Email markup language
¼a½2 mb ¼b½ 15 mb ¼c½ Electronic mail log
¼c½25 mb ¼d½ 100 mb ¼d½ email message file format
Ans.C Ans. D
email address @ email

¼a½ It indicate that the email is a reply or a encrption method


forwarded message
¼b½ It is used to mark the subject of the emial ¼a½Secure Socket Layer
¼c½ It separate the username from the domain ¼b½Advanced encrption standard
name
¼c½Rivest – Shamir – Aldeman
¼d½ It specify the camtry code of the email
recipient
¼d½Hash Code
Ans. C
Ans. C
email example&email provider.com
emial email provider.com
Attacement File Format

¼a½.txt ¼b½ .pdf


¼a½ recipients name
¼c½.xlsx ¼d½ .gif
¼b½ email provider’s doman name
Ans. C ¼c½ Sender’ name
email BCC Blind Carbon Copy ¼d½ Subject of email
Ans. B
Explanation email
¼a½ It prevents recipients from replying to the
email Address Domain Name
¼b½ It hides the list of recipients from other
recipients, providing privacy
¼c½ It indicates that the email is of low disposable/Temporary email
importance
¼d½ It marks the email as business Signup Spam
corrospondance copy.
Ans. B
¼a½Gmail ¼b½ Yahoo mail
Explanation BCC
¼c½Proton Mail ¼d½ Guerrila mail
Ans. D
¼b½ osc czkmtj dks ys[kd dh rjg uohure
email laLdj.k esa Lopkfyr :i ls viMsV djuk
Hot mail ¼c½ dS’k fd, x, MsVk dks gVkus ds fy,
¼a½ Outlook ¼b½ Proton mail ¼d½ mi;ksxdrkZ dks lqfo/kku ds fy, VSCl
¼c½ Yahoo ¼d½ D mail dks lewghÑr djus dh lqfo/kk
Ans. C Ans. A
Chromium open-source project Explanation
Microsoft

¼a½Mozilla Firefox
¼b½Google Chrome
¼c½Safari
¼d½Microsoft Edge ¼a½Opera
Ans. D ¼b½Google Chrome
¼c½Mozilla Firefox
¼d½Microsoft Edge
¼a½ lqjf{kr vkWuykbu ysunsu dks l{ke Ans. C
djuk Explanation Mozilla Firefox
¼b½ gj l= ds ckn LFkk;h :i ls czkmftax
bfrgkl dks lkQ djuk
¼c½ osclkbVksa dks ;wtj xfrfof/k dk VªSd
djus vkSj dqdht+ laxzg djus ls jksduk
¼d½ dqN {ks=ksa esa CykWd gksus okyh osclkbVksa
rd igq¡puk
Ans. C ¼a½ mi;ksxdrkZ dks fy[kus dh vuqefr nsus
Explanation ds fy, fLØIV] tks osclkbVksa ls baVjSDV
djrs gSa vkSj muds O;ogkj dks la’kksf/kr
djrs gSaA
¼b½ vf/kd czkmtj lqj{kk ds fy, dqN
osclkbVksa ds igqap dks CykWd djus ds fy,
¼a½Google Chrome ¼c½ viMsV czkmtj dks fy, vf/kder lqj{kk
¼b½Opera la’kks/kuksa ds lkFk Lor% la’kksf/kr djus ds
¼c½Mozilla Firefox fy,
¼d½Microsoft Edge ¼d½ osc czkmtj vkSj osc loZlZ ds chp MsVk
Ans. C dks ,fUØIV djus ds fy,
Explanation Ans. A
Explanation

¼a½ osclkbVksa vkSj muds lalk/kuksa dks


lqjf{kr :i ls le>kSrk djus dh izfØ;k
DOM
¼a½Accounts ¼b½ Data
¼a½Drive Object Model ¼c½Web Page ¼d½ Search Engine
¼b½Document Object Model Ans.C
¼c½Document Object Machine Explanation
¼d½Drive Object Machine
Ans. B
Explanation ¼a½ 1991 ¼b½ 1992 ¼c½ 1993 ¼d½ 1990
Ans. D
¼a½ [kjkc osclkbVksa dks CykWd djus vkSj Explanation
mi;ksxdrkZ dks vkWuykbu [krjksa ls lqjf{kr Chrome
j[kus ds fy,
¼b½ vklku midj.k ds fy, czkmtj bfrgkl ¼a½ 2002 ¼b½ 2003
dks laHkkyus ds fy, ¼c½ 2004 ¼d½ 2008
¼c½ osclkbV MsVk dks vLFkk;h :i ls Ans. D
laxzfgr djus] ftlesa Nfo;ka vkSj fLØIV~l Explanation
“kkfey gksrs gSa] rkfd i`’B yksfMax ds le; Graphical
de gks lds
¼d½ czkmtj vkSj osc loZlZ ds chp lalkj dks ¼a½ rwise ¼b½ Mosaic
,fUØIl djus ds fy, ¼c½ Nexus ¼d½ Mozilla
Ans. C Ans. B
Explanation Explanation Mosaic was the first
browser to display images in line with text
instead of displaying images in a separate
window, while often described as the first
graphical web browser.
caching mechanism

¼a½Chrome ¼b½ Opera


¼c½UC Browser ¼d½ Lynx
Document View Ans. B

¼a½Draft view
¼b½Outline view
¼c½Web layout view
¼d½Full screen reading
Ans. C
Explanation
Web Search Engline Explanation
Crawling
¼a½ osc i`’Bksa dks muds [kkst iz’u ds izfr
mi;qDrrk ds vk/kkj ij jSad djus dh
izfØ;k ¼a½Page loading speed
¼b½ osc i`’Bksa vkSj muds lkexzh dks ,d ¼b½Number of outbound links on a page
MsVkcsl esa laxzfgr djus dh izfØ;k ¼c½Number of social media shares
¼c½ osc i`’Bksa ls tkudkjh [kkstus vkSj bdëk ¼d½Web page's meta keywords
djus dh izfØ;k Ans. D
¼d½ mi;ksxdrkZ dks [kkst ifj.kke fn[kkus dh Explanation Search Engine
izfØ;k Google
Ans. C
Explanation

Search Engine Queries

Search
¼a½ OR
Search Engine ¼b½ AND
¼c½ NOT
¼d½ Quotation marks (" ")
Ans. D
Explanation
¼a½Keyword density Search
¼b½Backlinks from reputable websites Engine Search Query
¼c½Number of internal links on the page
¼d½Usage of meta tags
Ans. B ¼a½ Crawling
Explanation Search Engine ¼b½ Indexing
¼c½ Ranking
¼d½ Querying
Ans. C
Explanation
HTTP

¼a½Bing ¼b½ Yahoo ¼a½ 200 OK


¼c½DuckDuckGO ¼d½ Baidu ¼b½ 301 Moved Permanently
Ans. C ¼c½ 404 Not Found
¼d½500 Internal Server Error
Ans. C
Explanation HTTP ¼a½Black-hat SEO
¼b½White-hat SEO
¼c½Gray-hat SEO
¼d½Meta SEO
Search Engine Ans. A
Explanation
Chromium open-source project
Microsoft

¼a½Mozilla Firefox
¼a½Organic results ¼b½Google Chrome
¼b½Featured snippets ¼c½Safari
¼c½Sponsored results ¼d½Microsoft Edge
¼d½Site links Ans. D
Ans. B Explanation
Explanation
Google
¼a½ lqjf{kr vkWuykbu ysunsu dks l{ke
djuk
¼b½ gj l= ds ckn LFkk;h :i ls czkmftax
¼a½Web Rank bfrgkl dks lkQ djuk
¼b½Page Rank ¼c½ osclkbVksa dks ;wtj xfrfof/k dk VªSd
¼c½Search Rank djus vkSj dqdht+ laxzg djus ls jksduk
¼d½Google Rank ¼d½ dqN {ks=ksa esa CykWd gksus okyh osclkbVksa
Ans. B rd igq¡puk
Explanation Ans. C
Explanation
Search Engine

¼a½Page loading speed


¼b½Mobile-friendliness ¼a½Google Chrome
¼c½Number of social media followers ¼b½Opera
¼d½Quality and relevance of content ¼c½Mozilla Firefox
Ans. C ¼d½Microsoft Edge
Explanation Ans. C
Search Engine Explanation
¼a½ osclkbVksa vkSj muds lalk/kuksa dks
lqjf{kr :i ls le>kSrk djus dh izfØ;k
¼b½ osc czkmtj dks ys[kd dh rjg uohure
laLdj.k esa Lopkfyr :i ls viMsV djuk
¼c½ dS’k fd, x, MsVk dks gVkus ds fy,
¼d½ mi;ksxdrkZ dks lqfo/kku ds fy, VSCl DOM
dks lewghÑr djus dh lqfo/kk
Ans. A ¼a½Drive Object Model
Explanation ¼b½Document Object Model
¼c½Document Object Machine
¼d½Drive Object Machine
Ans. B
Explanation

¼a½Opera ¼a½ [kjkc osclkbVksa dks CykWd djus vkSj


¼b½Google Chrome mi;ksxdrkZ dks vkWuykbu [krjksa ls lqjf{kr
¼c½Mozilla Firefox j[kus ds fy,
¼d½Microsoft Edge ¼b½ vklku midj.k ds fy, czkmtj bfrgkl
Ans. C dks laHkkyus ds fy,
Explanation Mozilla Firefox ¼c½ osclkbV MsVk dks vLFkk;h :i ls
laxzfgr djus] ftlesa Nfo;ka vkSj fLØIV~l
“kkfey gksrs gSa] rkfd i`’B yksfMax ds le;
de gks lds
¼d½ czkmtj vkSj osc loZlZ ds chp lalkj dks
,fUØIl djus ds fy,
Ans. C
¼a½ mi;ksxdrkZ dks fy[kus dh vuqefr nsus Explanation
ds fy, fLØIV] tks osclkbVksa ls baVjSDV
djrs gSa vkSj muds O;ogkj dks la’kksf/kr
djrs gSaA
¼b½ vf/kd czkmtj lqj{kk ds fy, dqN caching mechanism
osclkbVksa ds igqap dks CykWd djus ds fy,
¼c½ viMsV czkmtj dks fy, vf/kder lqj{kk
la’kks/kuksa ds lkFk Lor% la’kksf/kr djus ds
fy, Document View
¼d½ osc czkmtj vkSj osc loZlZ ds chp MsVk
dks ,fUØIV djus ds fy, ¼a½Draft view
Ans. A ¼b½Outline view
Explanation ¼c½Web layout view
¼d½Full screen reading
Ans. C
Explanation ¼a½ osc i`’Bksa dks muds [kkst iz’u ds izfr
mi;qDrrk ds vk/kkj ij jSad djus dh
izfØ;k
¼b½ osc i`’Bksa vkSj muds lkexzh dks ,d
MsVkcsl esa laxzfgr djus dh izfØ;k
¼a½Accounts ¼c½ osc i`’Bksa ls tkudkjh [kkstus vkSj bdëk
¼b½Data djus dh izfØ;k
¼c½Web Page ¼d½ mi;ksxdrkZ dks [kkst ifj.kke fn[kkus dh
¼d½Search Engine izfØ;k
Ans. C Ans. C
Explanation Explanation

¼a½ 1991 ¼b½ 1992


¼c½ 1993 ¼d½ 1990
Ans. D
Explanation
Chrome Search Engine

¼a½ 2002 ¼b½ 2003


¼c½ 2004 ¼d½ 2008
Ans. D
Explanation ¼a½Keyword density
Graphical ¼b½Backlinks from reputable websites
¼c½Number of internal links on the page
¼a½ rwise ¼b½ Mosaic ¼d½Usage of meta tags
¼c½ Nexus ¼d½ Mozilla Ans. B
Ans. B Explanation Search Engine
Explanation Mosaic was the first
browser to display images in line with text
instead of displaying images in a separate
window, while often described as the first
graphical web browser.

¼a½Chrome ¼b½ Opera


¼c½UC Browser ¼d½ Lynx
Ans. B ¼a½Bing ¼b½ Yahoo
Explanation ¼c½DuckDuckGO ¼d½ Baidu
Web Search Engline Ans. C
Crawling Explanation
Ans. C
Explanation HTTP

¼a½Page loading speed


¼b½Number of outbound links on a page
¼c½Number of social media shares Search Engine
¼d½Web page's meta keywords
Ans. C
Explanation Search Engine
Google

¼a½Organic results
¼b½Featured snippets
¼c½Sponsored results
Search Engine Queries ¼d½Site links
b Featured snippets
Search Explanation
¼a½ OR Google
¼b½ AND
¼c½ NOT
¼d½ Quotation marks (" ")
Ans. D ¼a½Web Rank
Explanation ¼b½Page Rank
Search ¼c½Search Rank
Engine Search Query ¼d½Google Rank
Ans. B
Explanation
¼a½ Crawling
¼b½ Indexing Search Engine
¼c½ Ranking
¼d½ Querying
Ans. C ¼a½Page loading speed
Explanation ¼b½Mobile-friendliness
HTTP ¼c½Number of social media followers
¼d½Quality and relevance of content
Ans. C
Explanation
¼a½ 200 OK Search Engine
¼b½ 301 Moved Permanently
¼c½ 404 Not Found
¼d½ 500 Internal Server Error
¼a½Black-hat SEO
¼b½White-hat SEO
¼c½Gray-hat SEO
¼d½Meta SEO
Ans. A ¼a½HTTP ¼b½ FTP
Explanation ¼c½SSL ¼d½ SMTP
Ans. C
Explanation

¼a½ bZ&forj.k
¼b½ bysDVªkWfud isesaV~l
¼c½ fMftVy ekdZsfVax
¼d½ fcØh;kstuk ¼a½ bysDVªkWfud isesaV~l
Ans. D ¼b½ bZ&dkWelZ ykWftfLVdl
Explanation ¼c½ bZ&ekdZsfVax
¼d½ bZ&forj.k
Ans. B
Sales Strategy Explanation

SSL

¼a½ blls xzkgdksa esa Hkjkslk gksrk gS fd muds


O;fDrxr tkudkjh lqjf{kr gSA
¼b½ SSL izek.ki= ls osclkbV ds yksfMax COD
le; esa deh gksrh gSA
¼c½ blls osclkbV ds jSfdax dks c<+kus esa ¼a½ ØsdfMV vkWQj MsfcV
enn feyrh gSA ¼b½ dS’k vkWu fMyhojh
¼d½ SSL izek.ki= ls osclkbV ds fMtkbu esa ¼c½ dS’k vku fMek.M
csgrjh gksrh gSA ¼d½ ØsfMV vkWu fMyhojh
Ans. A Ans. B
Explanation SSL Explanation

¼a½ osx gksfLVax


a ¼b½ osclkbV lqj{kk
¼c½ bZ&dkWelZ dkVZ
¼d½ cSd&,aM MsoyiesaV
Ans. C
Explanation ¼a½ osc fo’ys’kd ¼b½ osc fMt+kbu
¼c½ bZ&dkWelZ foi.ku ¼d½ bZ&dkWelZ dkVZ
Ans. A
Explanation

ICT

¼a½ bZ&dkWelZ dEI;wfVax


¼b½ bZ&dkWelZ osc gksfLVax
¼c½ bZ&dkWelZ O;kolkf;d ekWMy
¼d½ bZ&dkWelZ ,ukfyfVdl
Ans. A ¼a½ fMftVy lkbust
Explanation ¼b½ MkWl vVSd
¼c½ ;wvkj,y foHkktu
¼d½ nks pj.kh lR;kiu
Ans. D
Explanation

¼a½ lkekftd ehfM;k iksfLVax


¼b½ bZ&esy lekpkj i=
¼c½ ,l,e,l ekdsZfVax
¼d½ fofM;ks xsEl B2C
Ans. B
Explanation ¼a½ vyhckck ¼b½ vestu
¼c½ “kkWihQkbZ ¼d½ bZus
Ans. B
Explanation B2C

SEO
¼a½ lqjf{kr bZ&dkWelZ vkWijs’kUl Ans. C
¼b½ lpZ batu vkWfIVbts’ku Explanation
¼c½ lks’ky ,axstesaV vkWuykbu
¼d½ bZ&dkWelZ dks foØ;’khy crkuk
Ans. B
Explanation SEO

¼a½ lks’ky lsfyax


¼b½ bU¶yq,alj ekdsZfVax
¼c½ ,fQfy,V ekdsZfVax
¼d½ dkWUVsV ekdsZfVax
¼a½ dS’k vkWu fMyhojh ¼dSM½ Ans. A
¼b½ bysDVªkWfud QaM VªkalQj ¼bZ,QVh½ Explanation
¼c½ fMftVy okWysV
¼d½ ok;j VªkalQj
Ans. C
Explanation

¼a½ vkWVkseSfVd Vsyh e’khu ¼ATM½


¼b½ vk/kkj dkMZ
¼c½ ok;jysl ekml vkSj dhcksMZ
¼d½ ok;jysal flD;ksfjVh Vksdu
Ans. D
¼a½C2C ¼b½ B2C Explanation
¼c½B2B ¼d½ B2G
Ans. C
Explanation B2B

¼a½ vyhckck ¼b½ vestu ¼a½ 24@7 [kkrk tkudkjh rd igqap


¼c½ usVf¶yDl ¼d½ bZcs ¼b½ rst vkSj lqfo/kktud /ku varj.k
¼c½ cSad “kk[kkvksa esa O;fXrxr xzkgd lsok ¼b½ gkbijVsDLV ekdZvi Hkk’kk
¼d½ vkWuykbu fcy Hkqxrku lqfo/kk ¼c½ opqZvy izkbosV usVodZ
Ans. C ¼d½ baVjusV eslst ,Dlsl izksVksdkWy
Explanation Ans. A
Explanation
SSL

¼a½ lks’ky flD;ksfjVh uoEcj ¼SSN½


¼b½ [kkrk/kkjd dk iwjk uke
¼c½ ;wtj vkbZMh vkSj ikloMZ
¼d½ eksckby Qksu uEcj ¼a½ igpku pksjh
Ans. C ¼b½ fnokfy;kiu
Explanation ¼c½ fQf'kax
¼d½ eqnkz LQhfr
Ans. A
Explanation

¼a½ bZ,evkbZ
¼b½ fQDLM fMikWftV jhU;wvy
¼c½ [kkrk LVsVesaV ¼a½ Q+sMjy VªsM deh’ku
¼d½ ba’;ksjsal izhfe;e Hkqxrku ¼b½ ;wjksfi;u lsaVªy cSad
Ans. C ¼c½ flD;ksfjVht vkSj ,Dlpsa cksMZ vkWQ
Explanation bafM;k
¼d½ lsaVªy cSad ;k eqnkz LQhfr fuxe
Ans. D
Explanation

¼a½ lqjf{kr lkWdsV ys;j


¼d½ Both B2C and B2B involve selling
products to businesses-
Ans. B
301- fdl bZ&d‚elZ fctusl e‚My esa ,d
IysVQ‚eZ ds ekè;e ls mRikn cspus okys
¼a½ dSIpk dksM rhljs i{k ds O;fä ;k O;olk; 'kkfey gksrs
¼b½ ;wvkj,y lR;kiu gSa] tcfd IysVQ‚eZ dk ekfyd ekdZsfVax]
¼c½ V~oh&QSDVj lR;kiu Hkqxrku çlaLdj.k vkSj y‚ftfLVDl laHkkyrk
¼d½ fQaxjfizaV lR;kiu gS\
Ans. C a¼a½ Subscription model
Explanation ¼b½ Dropshipping
2FA ¼c½ Affiliate marketing
¼d½ Direct sales
Ans. B
302- fuEufyf[kr esa ls fdl bZ&d‚elZ
e‚My esa [kjhnkj vkSj foØsrk ,d v‚uykbu
IysVQ‚eZ ds Hkhrj mRiknksa ij ckrphr vkSj
cksyh yxkuk 'kkfey djrs gSa\
a¼a½ Subscription model
¼b½ Peer&to&peer ¼P2P½ model
¼c½ Direct sales model
¼a½ usV cSafdax ¼d½ Affiliate marketing model
Ans. B
¼b½ bUVjusV cSafdax
303- varjkZ"Vªh; bZ&cSafdax ysunsu esa fLo¶V
¼c½ vkWVksesVsM Vsyj e’khu
dksM dh D;k Hkwfedk gS\
¼d½ eksxkby cSafdax
Ans. C
¼a½ It verifies the customer's identity during
login-
Explanation
¼b½ It provides live customer support-
ATM
¼c½ It ensures compliance with local
regulations-
¼d½ It identifies the recipient's bank in
300- B2C ¼fctusl&Vw&daT;wej½ vkSj B2B ¼ international money transfers-
fctusl&Vw&fctusl½ bZ&d‚elZ e‚My ds Ans. D
chp eq[; varj D;k gS\ 304- bZ&d‚elZ Content Management System
¼a½ B2C involves selling products to ¼CMS½ dk çkFkfed mís'; D;k gS\
businesses, while B2B involves selling ¼a½ Processing online payments securely-
products to individual consumers- ¼b½ Managing inventory and stock levels-
¼b½ B2C involves selling products to ¼c½ Creating and organizing digital content,
individual consumers, while B2B involves
such as product descriptions and images-
selling products to businesses-
¼c½ Both B2C and B2B involve selling ¼d½ Analyzing customer browsing behavior-
products to individual consumers- Ans. C
305- bZ&cSafdax esa "Know Your Citizen" ¼d½ Usenet
¼dsokbZlh½ çfØ;k dk mís'; D;k gS\ Ans. C
a¼a½ To provide customers with detailed Explanation: IRC ¼Internet Relay Chat½- IRC
financial reports- is an old but still used protocol for real&time
¼b½ To offer personalized investment advice- text communication over the Internet-
¼c½ To ensure compliance with tax 309- baVjusV ds lanHkZ esa "botnet" D;k gS\
regulations- a¼a½ A specialized search engine for online
¼d½ To verify the identity and assess the risk shopping-
of customers for anti&fraud and anti&money ¼b½ A software tool used for optimizing
laundering purposes- network performance-
Ans. D ¼c½ A network of compromised computers
306- osc ekudksa vkSj çksVksd‚y ds fodkl controlled by a malicious actor-
ds fy, dkSu lk laxBu ftEesnkj gS\ ¼d½ A type of firewall used to protect against
a¼a½ IEEE ¼Institute of Electrical and malware-
Electronics Engineers ½ Ans. C
¼b½ ISO ¼International Organization for Explanation: A botnet is a collection of
internet&connected devices, such as
Standardization½
computers, servers] smartphones] and loT
¼c½ W3C ¼World Wide Web Consortium½
devices] that have been infected with malware
¼d½ IETF ¼Internet Engineering Task Force½ and are controlled by a central command and
Ans. C
control ¼C&C½ server-
307- fdlh usVodZ ij loZj ;k daI;wVj esa
nwjLFk :i ls y‚x bu djus ds fy, fdl 310- dkSu lk 'kCn ,dkfèkd ,fIyds'ku ;k
baVjusV çksVksd‚y dk mi;ksx fd;k lsokvksa rd igqapus ds fy, y‚fxu
ØsMsaf'k;y ds ,d lsV dk mi;ksx djus ds
tkrk gS\
¼a½ HTTP vH;kl dk o.kZu djrk gS\
¼a½ Multi&User Authentication
¼b½ FTP
¼c½ SSH ¼b½ Single Sign On ¼SSO½
¼c½ Cross&Platform Login
¼d½ DNS
Ans. C
¼d½ Unified Access Management
Explanation: SSH is a cryptographic network Ans. B
protocol used for secure remote login and 311- dkSu lh rduhd fcVd‚bu tSlh
command eÛecution on remote computers- fodsaæh—r vkSj lqjf{kr fMftVy eqækvksa ds
provides encrypted communication between fuekZ.k dh vuqefr nsrh gS\
client and a server, ensuring the a¼a½ DNS
confidentiality and integrity of data exchanged
¼b½ HTTP
during the session-
¼c½ Blockchain
308- fuEufyf[kr esa ls dkSu lh baVjusV ¼d½ FTP
lsok VsDLV lans'kksa ds ekè;e ls okLrfod Ans. C
le; lapkj çnku djrh gS\ 312- dkSu lh rduhd LekVZQksu vkSj
a¼a½ Email ySiV‚i tSls midj.kksa dks ikjaifjd lsyqyj
¼b½ FTP usVodZ ;k okbZ&QkbZ dk mi;ksx fd, fcuk
¼c½ IRC baVjusV ls dusDV djus esa l{ke cukrh gS\
¼a a½
NFC ¼Near Field Communication½ 317- fdl çdkj dk bZesy çek.khdj.k bZesy
¼b½Li&Fi ¼Light Fidelity½ LiwfQax vkSj fQ+f'kax dks jksdus esa enn
¼c½VolP ¼Voice over Internet Protocol½ djrk gS\
¼d½PAN ¼Personal Area Network½ a¼a½ SSL
Ans. B ¼b½ SPF
313- fuEufyf[kr esa ls dkSu lk çksVksd‚y ¼c½ SMTP
vkerkSj ij bZesy Hkstus vkSj çkIr djus ds ¼d½ IMAP
fy, mi;ksx fd;k tkrk gS\ Ans. B
¼a½ HTTP Explanation: SPF ¼Sender Policy Framework½
¼b½ SMTP SPF is an email authentication method that
¼c½ FTP helps prevent email spoofing by specifying
which mail servers are authorized to send
¼d½ DNS
emails on behalf of a domain-
Ans. B
314- fuEufyf[kr esa ls fdl baesy [krjs esa 318- eksft+yk Q+k;jQ+‚Dl osc czkmt+j }kjk
laosnu'khy tkudkjh çkIr djus ds bjkns ls fdl jsaMfjax batu dk mi;ksx fd;k tkrk
èkks[kkèkM+h okys baesy Hkstuk 'kkfey gS\ gS\
¼a½ Spam ¼a a½ Trident
¼b½ Phishing ¼b½ Webkit
¼c½ Spoofing ¼c½ Blink
¼d½ Malware ¼d½ Gecko
Ans. B Ans. D
Explanation: Mozilla Firefox uses the Gecko
315- dkSu lk bZesy Q+ksYMj vke rkSj ij i<+s rendering engine to render web pages and
x, vkSj lacksfèkr fd, x, vkus okys bZesy display their content-
dks laxzghr djus ds fy, mi;ksx fd;k 319- dkSu lh osc czkmt+j lqfoèkk
tkrk gS\ mi;ksxdrkZvksa dks vius Lo;a ds VSc esa ,d
¼a½ Trash gh foaMks esa dbZ osclkbV [kksyus dh vuqefr
¼b½ Spam nsrh gS\
¼c½ Sent a¼a½ Incognito mode
¼d½ Inbox ¼b½ Private browsing
Ans. D ¼c½ Tabbed browsing
316- dkSu lh bZesy lsok vius ,aM&Vw&,aM ¼d½ Split view
,fUØI'ku vkSj mi;ksxdrkZ xksiuh;rk ij Ans. C
è;ku dsafær djus ds fy, tkuh tkrh Explanation: Tabbed browsing is a feature that
gSa\ allows users to open multiple websites in a
a¼a½ Gmail single browser window, each in its own tab-
¼b½ Yahoo Mail 320- dkSu lk 'kCn ,d gh le; esa fdlh
¼c½ Outlook Mksesu ij fd, x, vuqjksèkksa dh la[;k dks
¼d½ ProtonMail lhfer djus ds fy, osc czkmt+j }kjk
Ans. D mi;ksx dh tkus okyh rduhd dk o.kZu
djrk gS\
¼a a½ Throttling
¼b½ Caching Ans. A
¼c½ Pipelining Explanation: An outbound link, also known as
an external link, is a hyperlink that leads to a
¼d½ Sharding different website or domain, It directs users to
a Ans. A another source outside the current webpage-
Explanation: Throttling is a technique used by
web browsers to limit the number of requests
325- fuEufyf[kr esa ls dkSu lk flLVe
made to a specific domain at the same time- l‚¶Vos;j dk mnkgj.k gSa\
This helps prevent overloading the server and ¼a½ Word processing software.
ensures smoother performance- ¼b½ Video editing software.
321- dkSu lh czkmt+j lqfoèkk mi;ksxdrkZvksa ¼c½ Web browser.
dks fofHkUu osclkbVksa ds fy, vius y‚fxu ¼d½ Operating system.
ØsMsaf'k;y dks ,fUØIVsM çk:i esa laxzghr Ans. D
djus dh vuqefr nsrh gS\ 326- vksiu lkslZ l‚¶Vos;j D;k gS \
a¼a½ Auto&refresh ¼a½ Software that is available for free.
¼b½ Autofill ¼b½ Software that can only be used on open
¼c½ Autocomplete networks.
¼d½ Auto&resize ¼c½ Software with publicly available source
code that can be modified and redistributed.
Ans. B
322- vfèkd fof'k"V dhoMZ tksM+dj fdlh ¼d½ Software that is developed by a single
person.
[kkst Dosjh dks ifj"—r djus dh çfØ;k dks Ans. C
vkerkSj ij dgk tkrk gS- 327- dkSu lh l‚¶Vos;j fodkl i)fr
¼a½ Query expansion vuqdwy ;kstuk vkSj yphysiu ij tksj nsrh
¼b½ Query augmentation gS\
¼c½ Query enhancement ¼a½ Waterfall.
¼d½ Query extension ¼b½ Agile.
Ans. A ¼c½ Spiral.
323- tc mi;ksxdrkZ viuh [kkst Dosjh ¼d½ Prototype.
Vkbi djrk gS rks dkSu lh [kkst batu Ans. B
rduhd Lopkfyr :i ls lq>ko mRiUu Explanation: Agile methodology promotes
djus ds fy, ftEesnkj gS\ adaptive planning, continuous improvement, and
¼a½ AutoSuggest flexibility in
software development. It involves iterative
¼b½ Instant Search development cycles, collaboration, and
¼c½ Predictive Search responding to changes
¼d½ Autocomplete throughout the development process.
Ans. D 328- l‚¶Vos;j fodkl esa daikbyj dk
324- dkSu lk 'kCn ,d gkbijfyad dk o.kZu mnns'; D;k \
djrk gS tks ,d vyx osclkbV ;k Mksesu ¼a½ To convert source code into machine code.
ij ys tkrk gS\ ¼b½ To debug code and fix errors.
¼a½ Outbound link ¼c½ To design user interfaces.
¼b½ Inbound link ¼d½ To provide database management.
¼c½ Internal link Ans. A
¼d½ Backlink
329- fdl çdkj dk l‚¶+Vos;j ykblsal ¼d½HTML.
mi;ksxdrkZvksa dks l‚¶+Vos;j dks la'kksfèkr Ans. C
vkSj forfjr djus dh vuqefr nsrk gS] 333- fdl çdkj dk l‚¶+Vos;j vafre
ysfdu fdlh Hkh la'kksfèkr laLdj.k dks vksiu mi;ksxdrkZvksa ds fy, fof'k"V dk;Z ;k dk;Z
lkslZ Hkh gksuk pkfg,\ djus ds fy, fMt+kbu fd;k x;k gS] tSls
¼a½ Public domain license. cMZ çkslsflax ;k LçsM'khV x.kuk \
¼b½ Closed-source license. ¼a½ System software.
¼c½ Proprietary license. ¼b½ Application software.
¼d½ Copyleft license. ¼c½ Middleware.
Ans. D ¼d½ Firmware.
Explanation: Copyleft license. A copyleft Ans. B
license permits users to modify and distribute 334- l‚¶Vos;j fodkl ds lanHkZ esa "API"
the software, but any
modified versions must also be released under
'kCn dk D;k vFkZ \
the same open-source terms, ensuring that ¼a½ Application Interface Protocol.
derivative works ¼b½ Application Programming Interface.
remain open-source as well. ¼c½ Advanced Program Integration.
330- fdl l‚¶+Vos;j ijh{k.k rduhd esa ¼d½ Automated Processing Interface.
l‚¶Vos;j ,fIyds'ku dh O;fäxr bdkb;ksa Ans. B
;k ?kVdksa dk vyx ls ijh{k.k djuk 'kkfey 335- dkSu lk l‚¶+Vos;j fodkl e‚My
gSa\ ifj;kstuk dks NksVs] çcaèkuh; pj.kksa esa
¼a½ System testing. foHkkftr djrk gS ] çR;sd pj.k dh ;kstuk
¼b½ Integration testing. cukbZ tkrh gS ]fu"ikfnr dh tkrh gS vkSj
¼c½ Unit testing. vxys pj.k ij tkus ls igys leh{kk dh
¼d½ Regression testing tkrh gS\
331- dkSu lk l‚¶+Vos;j ifjfu;kstu e‚My ¼a½ Waterfall model.
mi;ksxdrkZvksa dks lnL;rk ds vkèkkj ij ¼b½ Agile model.
baVjusV ij l‚¶+Vos;j ,fIyds'ku rd igqapus ¼c½ RAD (Rapid Application Development)
dh vuqefr nsrk gS\ model.
¼a½ On-premises deployment. ¼d½ Spiral model.
¼b½ Open-source deployment. Ans. C
¼c½ Cloud deployment. 336- ;g fuèkkZfjr djus ds fy, fdl çdkj
¼d½ Local deployment. dk l‚¶+Vos;j ijh{k.k fd;k tkrk gS fd
Ans. C l‚¶+Vos;j viuh fufnZ"V vko';drkvksa dks
332- dkSu lh çksxzkfeax Hkk"kk eq[; :i ls iwjk djrk gS vkSj lgh <ax ls dk;Z djrk
osc vkèkkfjr ,fIyds'ku fodflr djus ds gS\
fy, mi;ksx dh tkrh gS vkSj vius mi;ksx ¼a½ Usability testing.
esa vklkuh vkSj cgqeq[kh çfrHkk ds fy, tkuh ¼b½ Regression testing.
tkrh gS\ ¼c½ Acceptance testing.
¼a½ Java. ¼d½ Performance testing.
¼b½ C++. Ans. C
¼c½ Python. 337- dkSu ls l‚¶+Vos;j fodkl vH;kl esa
,dhdj.k leL;kvksa dk 'kh?kz irk yxkus
vkSj mudk lekèkku djus ds fy, ubZ 341- fØl l‚¶+Vos;j fodkl vH;kl esa
MsoyilZ ds dksM ifjorZuksa dks ,d lk>k buiqV MsVk QhM djds vkSj vkmViqV dh
fji‚ftVjh esa ckj&ckj ,dh—r djuk tkap djds l‚¶+Vos;j ,fIyds'ku dh
'kkfey gS\ dk;Z{kerk dk ijh{k.k djuk 'kkfey \
¼a½ Continuous Integration (CI). ¼a½ Performance testing.
¼b½ Continuous Deployment (CD). ¼b½ Load testing.
¼c½ Continuous Testing (CT). ¼c½ Functional testing.
¼d½ Continuous Monitoring (CM). ¼d½ Security testing.
Ans. A Ans. C
Explanation: Continuous Integration (CI). CI 342- fdl çdkj dh l‚¶+Vos;j fodkl
involves frequently integrating code changes i)fr mi;ksxdrkZ dh çfrfØ;k ,d= djus
from multiple
developers into a shared repository to identify vkSj vafre mRikn dks ifj"—r djus ds fy,
integration issues and maintain a consistent l‚¶+Vos;j dk ,d NksVk] iwjh rjg dk;kZRed
codebase. laLdj.k cukus ij dsafær gS\
338- dkSu lk çksxzkfeax çfreku MsVk ¼a½ Waterfall.
lajpukvksa vkSj mu ij fd, tk ldus okys ¼b½ Scrum.
lapkyu dks ifjHkkf"kr djus ij dsafær gS\ ¼c½ Extreme Programming (XP).
¼a½ Object-oriented programming (OOP). ¼d½ Prototyping.
¼b½ Functional programming. Ans. D
¼c½ Procedural programming. 343- fdl çdkj dk l‚¶Vos;j daI;wVj
¼d½ Imperative programming. gkMZos;j dks çcafèkr vkSj fu;af=r djus vkSj
Ans. B vU; l‚¶Vos;j dks pykus ds fy, ,d eap
339- l‚¶+Vos;j fodkl çfØ;k esa l‚¶+Vos;j çnku djus ds fy, ftEesnkj gS\
nLrkost+hdj.k dk mís'; D;k gS\ ¼a½ System software.
¼a½ To replace the need for writing code ¼b½ Application software.
comments. ¼c½ Middleware.
¼b½ To provide a detailed guide for end-users. ¼d½ Firmware.
¼c½ To record the history of changes in the Ans. A
source code. 344- MsVk dks laxzghr djus] iquçkZIr djus
¼d½ To describe how the software works, its viMsV djus vkSj O;ofLFkr djus lfgr
design, and usage instructions.
Ans. D MsVkcsl dks çcafèkr vkSj fu;af=r djus ds
340- fdl l‚¶+Vos;j ijh{k.k fofèk esa fy, fdl çdkj ds l‚¶+Vos;j dk mi;ksx
l‚¶+Vos;j dks pykuk vkSj nks"kksa vkSj eqíksa dh fd;k tkrk gS\
igpku djus ds fy, vafre& mi;ksxdrkZ ds ¼a½ Word processing software.
:i esa blds lkFk ckrphr djuk 'kkfey gSa\ ¼b½ Spreadsheet software.
¼a½ White-box testing. ¼c½ Database management software.
¼b½ Black-box testing. ¼d½ Graphic design software.
¼c½ Gray-box testing. Ans. C
¼d½ Unit testing. 345- fdl çdkj dk l‚¶Vos;j VsDLV
Ans. A nLrkost+ cukus] laikfnr djus vkSj çk:fir
djus ds fy, midj.k vkSj dk;Z{kerk çnku MsVk dks laxzghr vkSj fo'ys"k.k djus ds fy,
djrk gS\ fdl l‚¶+Vos;j dk mi;ksx fd;k tkrk gS\
¼a½ Spreadsheet software. ¼a½ Customer relationship management (CRM)
¼b½ Graphic design software. software.
¼c½ Word processing software. ¼b½ Enterprise resource planning (ERP)
¼d½ Presentation software. software.
Ans. C ¼c½ Financial management software.
346- ç;ksx] fo'ys"k.k vkSj çf'k{k.k mís';ksa ds ¼d½ Inventory management software.
fy, okLrfod nqfu;k ds ifj–';ksa ;k Ans. A
çfØ;kvksa dk vuqdj.k djus ds fy, fdl 350- ekbØkslkW¶V oMZ esa ^QkWeZVs iSaVj^ Vwy
çdkj ds l‚¶+Vos;j dk mi;ksx fd;k tkrk dk mís’; D;k gS\
gS\ ¼a½ To change the font size of selected text.
¼a½ Simulation software. ¼b½ To copy and apply formatting from one
portion of text to another.
¼b½ Virtualization software. ¼c½ To create text boxes.
¼c½ Optimization software. ¼d½ To adjust page margins.
¼d½ Machine learning software. Ans. B
Ans. A
351- ekbØkslkW¶V oMZ esa dkSulh lqfo/kk
347- fdl çdkj dk l‚¶+Vos;j vkidks ;g ns[kus dh vuqefr nsrh gS fd
mi;ksxdrkZvksa dks vDlj mUur dksfMax eqfnzr gksus ij dksbZ nLrkost dSlk fn[ksxk\
dkS'ky dh vko';drk ds fcuk] osclkbVksa ¼a½ Print Preview
ij lkexzh cukus] laikfnr djus vkSj ¼b½ Page Layout
çdkf'kr djus esa l{ke cukrk gS\ ¼c½ WordArt
¼a½ Web development software. ¼d½ Track Changes
¼b½ Content management system (CMS). Ans. A
¼c½ E-commerce software. 352- ikojikWbaV esa dkSulh lqfo/kku vkidks
¼d½ Search engine optimization (SEO) software. izkstsaV’s ku esa izR;sd LykbM ds fy, le; dk
Ans. B
iwokZH;kl djus dh vuqefr nsrh gS\
348- okLrfod nqfu;k esa] vDlj bathfu;fjax ¼a½ Slide Sorter
vkSj okLrqdyk tSls {ks=ksa esa fuekZ.k ls igys ¼b½ Animation Pane
HkkSfrd ?kVdksa ;k ç.kkfy;ksa dks fMtkbu] ¼c½ Presenter View
e‚My vkSj vuqdj.k djus ds fy, fdl ¼d½ Slide Show rehearsal
l‚¶Vos;j dk mi;ksx fd;k tkrk gS\ Ans. D
¼a½ 3D modeling software. 353- ,Dlsy esa ^VLOOKUP^ QaD’ku dk
¼b½ Animation software. mís’; D;k gS\
¼c½ Computer-aided design (CAD) software. ¼a½ To perform calculations based on logical
¼d½ Graphic design software. conditions.
Ans. D ¼b½ To search for a value in a range and return
349- O;kolkf;d çfØ;kvksa dks Lopkfyr a corresponding value from another range.
djus] xzkgd lacaèkksa dks çcafèkr djus vkSj ¼c½ To generate random numbers for statistical
foi.ku vkSj fcØh mís';ksa ds fy, xzkgd analysis.
¼d½ To create visual charts and graphs.
Ans. B 358- MsVk HkaMkj.k ds lanHkZ esa ^RAID^ “kCn
354- ikWojikWbaV esa ekWQZ Transition dk mís’; dk D;k vFkZ gS\
D;k gS\ ¼a½ Rapid Access Integrated Drive
¼a½ To apply 3D animations to slide elements. ¼b½ Redundant Array of Independent Disks
¼b½ To create smooth animations between ¼c½ Remote Access and Information Database
similar slides. ¼d½ Robust Application and Interface Design
¼c½ To convert slides into video format. Ans. B
¼d½ To enable real­time collaboration on 359- dkSulh rduhd VpLØhu dks ncko dk
presentations. Li’kZ laosnu’khy ds fofHkUu Lrjksa ds chp
Ans. B
varj djus esa l{ke cukrh gS\
355- ,Dlsy esa ^baMsDl eSp^ QaD’ku ¼a½ Capacitive Touch
Combination dk mís’; D;k gS\
¼b½ Resistive Touch
¼a½ To concatenate text from multiple cells. ¼c½ Optical Touch
¼b½ To create custom data validation rules. ¼d½ Infrared Touch
¼c½ To retrieve a value from a specific cell Ans. A
within a range based on matching criteria.
360- fuEufyf[kr esa ls dkSulk midj.k
¼d½ To calculate the average of a range of vkerkSj ij oLrqvksa vkSj okrkoj.k dh 3Mh
numbers.
Ans. C LFkkfud tkudkjh dSIpj djus ds fy,
356- fdl ih<+h ds dEi;wCj esa baVhxssVM
s mi;ksx fd;k tkrk gS\
lfdZV ¼vkbZlh½ dk mi;ksx gksrk gS vkSj ¼a½ Barcode Scanner
blus vkdkj vkSj n{krk ds ekeys esa ¼b½ RFID Reader
egRoiw.kZ izxfr dh gS\ ¼c½ LiDAR Sensor
¼a½ First generation ¼d½ Microphone
¼b½ Second generation Ans. C
¼c½ Third generation 361- dkSulk buiqV fMokbl dEi;wVj dk;ksZa
¼d½ Fourth generation dks fu;af=r djus ds fy, ekalisf’k;ksa dh
Ans. B fo|qr xfrfof/k dks ekius ds fy, bysDVªksM+
357- dkSulk izksxzkfeax izfreku x.kuk dks dk mi;ksx djrk gS\
xf.krh; dk;ksZa ds ewY;kadu ds :i esa ekuus ¼a½ Joystick
ij dsfUnzr gS vkSj cnyrh fLFkgr vkSj ¼b½ Trackball
ifjorZu'khy MsVk ls cpkrk gS\ ¼c½ EEG Headset
¼a½ Procedural programming ¼d½ Graphics Tablet
¼b½ Object­oriented programming Ans. C
¼c½ Functional programming 362- fdl izdkj dk vkWijsfVax flLVe ,d
¼d½ Imperative programming usVodZ okrkoj.k esa fofHkUu izkslslj ij dbZ
Ans. C ijLij twMs+ dk;ksZa dks fu’ikfnr djus esa
Explanation: Functional programming focuses l{ke cukrk gS\
on treating computation as the evaluation of ¼a½ Real­Time Operating System (RTOS)
mathematical functions. It avoids changing ¼b½ General­Purpose Operating System
state and mutable data, promoting immutability ¼c½ Distributed Operating System
and declarative style.
¼d½ Batch Processing Operating System
Ans. C 367- fdl izdkj dk bZesy izek.khdj.k bZesy
363- dkSulk ,Yxksfjne fdlh lalk/ku rd Liwfdax vkSj fQf’kax dks jksdus esa enn djrk
igqapus dh izrh{kk dj jgh izfØ;kvksa dh gS\
lwph cuk, j[kus] fu’i{krk lqfuf’pr djus ¼a½ SSL
vkSj Hkq[kejh dks jksdus ds fy, drkj dk ¼b½ SPF
mi;ksx djrs gSa\ ¼c½ SMTP
¼a½ Banker's Algorithm ¼d½ IMAP
¼b½ Round Robin Ans. B
¼c½ Shortest Job Next (SJN) Explanation: SPF (Sender Policy Framework)
¼d½ First­Come, First­Served (FCFS) SPF is an email authentication method that
Ans. D helps prevent email spoofing by specifying
Explanation: the First­Come, First­Served (FCFS) which mail servers are authorized to send
algorithm uses a queue to manage processes emails on behalf of a domain.
waiting for a resource, ensuring fairness in 368- dkSulh czkmtj lqfo/kk igys ntZ fd,
resource allocation and preventing starvation. x, MsVk ds vk/kkj ij mi;ksxdrkZ ds buiqV
364- [kkst batu D;k mi;ksx djrs gSa rkfd dks Lopkfyr :i ls iwjk djrh gS\
os mi;ksDrkvksa ds iqjkus [kkst ifj.kkeksa dks ¼a½ Autocomplete
Le`fr esa j[k ldsa vkSj mUgsa ckn esa iznf’kZr ¼b½ Autofill
dj ldsaA ¼c½ Auto­suggest
¼a½ Cookies ¼d½ Auto­complete
¼b½ Query storage) Ans. B
¼c½ Crawling algorithm 369- dkSulk [kkst batu ekbØkslkW¶V
¼d½ Indexing algorithm fodflr fd;k x;k Fkk vkSj blesa n`’; [kkst
Ans. A rduhd “kkfey gS\
365- dkSulh rduhd [kkst batu dks osc ¼a½ Bing
i`’Bksa dks le>us vkSj mUgsa lwphc) djus dh ¼b½ Yahoo
vuqefr nsrh gS\ ¼c½ DuckDuckGo
¼a½ Cookies ¼d½ Ask.com
¼b½ Indexing Ans. A
¼c½ Ranking 370- dkSulk bZ&dkWelZ ekWMyh fcuk bUosaVªh
¼d½ Querying j[ks vkiwfrZdrkvksa vkSj Fkksd foØsrkvksa ls
Ans. A izkIr mRiknksa foØ; ij dsfUnzr gS\
366- dkSulk baesy izksVksdkWy dbZ fMokblksa ¼a½ Subscription Model
ls bZesy dks flaØksukbt j[krs gq, lwphc) ¼b½ Dropshipping Model
djus dh vuqefr nsrh gS\ ¼c½ B2B (Business­to­Business) Model
¼a½ POP3 ¼d½ Marketplace Model
¼b½ IMAP Ans. B
¼c½ SMTP 371- fdl bZ&dkWelZ ekWMy esa vkWuykbu
¼d½ HTTP IysVQkeZ [kjhnkjksa vkSj foØsrkvksa ds chp
Ans. B e/;LFk ds :i esa dk;Z djrk gS] ysunsu dks
l{ke cukrk gS vkSj izR;sd fcØh ds fy,
deh’ku ;k “kqYd vftZr djrk gS\
¼a½B2B (Business­to­Business) ¼B½ The Value in cell B3
¼b½C2B (Consumer­to­Business) ¼C½ An error because INDEX function
¼c½B2C (Business­to­Consumer) requires three arguments.
¼D½ The intersection of row 3 and column 1 in
¼d½C2C (Consumer­to­Consumer)
the range A1:B10
Ans. C
Ans. D
372- bZ&cSafdax ysunsu esa ^fMftVy gLrk{kj^ Explenation %
dk D;k dk;Z gS\ 377- Microsoft word esa fdlh nLrkost dks
¼a½ Providing access to virtual branch services. lgstus ds fy, fuEufyf[kr esa ls dkSu ekU;
¼b½ Encrypting sensitive financial information. Qkby Lo:i ugha gS \
¼c½ Verifying the authenticity and integrity of ¼A½ .docx
electronic documents or transactions. ¼B½ .txt
¼d½ Managing customer loyalty rewards. ¼C½ .jpg
Ans. C ¼D½ .pdf
373- fdl foi.ku rduhd esa ,d fQftdy Ans. C
Explenation %
vkWCtsDV dh Nfo dks fMftVy MssVk esa
378- oMZ esa Thesaurus lqfo/kk vkidks d;k djus
:ikarfjr fd;k tkrk gS\ dh vuqefr nsrh gS \
¼a½ best LdSfpax ¼A½ Translate text to different languages.
¼b½ ohfM;ks dSIpfjax ¼B½ Search for synonyms and antonyms of
¼c½ vkWfM;ks fjdkWfMZax selected words.
¼d½ VSDLV ,UVªh ¼C½ Create a table of contents.
374- fdl gkMZos;j midj.k dk mi;ksx ¼D½ Change the font style of entire documents.
fo’ks’kr% xsfeax esa fd;k tkrk gS tks Ans. B
Explenation %
f[kykfM+;ksa dks [ksy ds vuqHko dks csgrj 379- vki ,Dlys esa fdlh fof'k"V odZ'khV dks
cukus esa enn djrk gS\ laikfnr gksus ls dSls cpk ldrs gS \
¼a½ fiazVj ¼A½ By locking all cells in the worksheet
¼b½ xzkfQDl dkMZ ¼B½ By hiding the worksheet
¼c½ usVodZ jkmVj ¼C½ By applying a password to the entire
¼d½ LdSuj workbook.
Ans. B ¼D½ By saving the worksheet as a read only
375- vki fdlh Word nLrkost esa lHkh file.
gkbijfyad dSls gVk ldrs gS \ Ans. A
¼A½ Manually delete each hyperlink one by Explenation %
one. 380- Lihdj uksV~l ds lkFk izstsVs'ku dk
¼B½ Use the 'Clear Formatting' option form the iwokZH;kl djus ds fy, ikojikWbaV esa dkSulk n`';
'Font' dialog box. lcls mi;qZDr gksrk gS \
¼C½ Press Ctrl + Shift + K ¼A½ Slide sorter view
¼D½ Use the Remove Hyperlinks option from ¼B½ Normal view
the Insert tab ¼C½ Presenter view
Ans. C ¼D½ Slide Master view
Explenation % Ans. C
376- ,Dlsy QaD'ku = INDEX(A1:B10,3,2) Explenation %
D;k ykSVkrk gS \ 381-7 Power Point esa ^Vªkaft'ku lqfo/kk dk
¼A½ The value in cell A1 izkFkfed mÌs'; D;k gS \
¼A½ To change the color shceme of slides Explenation %
¼B½ To apply special effects to text 387- dksSulh eseksjh izca/ku rduhd izfØ;kvksa dh
¼C½ To control how slides appear and eseksjh ds fdlh Hkh miyC/k foHkktu esa vkoafVr gS
disappear during a slide show. \
¼D½ To create 3D animations. ¼A½ Paging
Ans. C ¼B½ Contiguous Allocation
Explenation % ¼C½ Fragmentation
382- dkSulk gkbMZos;j fMokbl badok;jesaVy ¼D½ Segmentation
fizfVax ds fy, mi;ksx gksrk gS \ Ans. B
¼A½ 3D fizaVj Explenation %
¼B½ LdSuj 388- ;wfuDl tSls vkWijVsfVax flLVe esa ^QksdZ ¼½*
¼C½ dkWih e'khu flLVe dkWy dk izkFkfed mn~ns'; D;k gS \
¼D½ fiazVj ¼A½ To Create a new process
Ans. A ¼B½ To allocate memory
Explenation % ¼C½ To delete files
383- dkSulk gkMZos;j fMokbl MsVk dks vLFkk;h ¼D½ To change file permissions
:I ls LVksj djrkgS vkSj fcuk fon~;wr 'kfDr ds Ans. A
Hkh thfor jgrk gS \ Explenation %
¼A½ RAM (Random Access Memroy) 389- fdlh vkWijsfVax flLVe esa ^duZy* dk
¼B½ Hard (Disk Drive) izkFkfed mn~ns'; D;k gS \
¼C½ SSD (Solid State Drive) ¼A½ To manage hardware resources
¼D½ ROM (Read Only Memory) ¼B½ To provide a user interface
Ans. D ¼C½ To run application software
Explenation % ¼D½ To store user data
384- fuEufyf[kr esa ls dkSulh Interpreting Ans. A
Programming Language dk mnkgj.k gS \ Explenation %
¼A½ C+++ 390- [kkst batu vYxksfj;e D;k Øfer djrs gSa
¼B½ Java rkfd [kkst ifj.kkeksa esa mi;ksxdrkZvksa ds fy,
¼C½ Python LFkkfir dh tk lds \
¼D½ C# ¼A½ ØkWfyax vYxksfjne ¼Crawling algorithm½
Ans. C ¼B½ baMsfLDlax vYxksfj;e (Indexing algorithm)
Explenation % ¼C½ jSfdax vYxksfjFke (Ranking algorithm)
385- baVjusV ds lanHkZ esa laf{kIr uke 'URL' dk ¼D½ lfpZax vYxksfjne (Searching algorithm)
D;k vFkZ gS \ Ans. C
¼A½ Unirform Resource Locator Explenation %
¼B½ Universla Routing Link 391- fuEufyf[kr esa ls dkSulk [kkst vkWijsVj
¼C½ User Related link mi;ksxdÙkkZvksa dks [kkst batu Dosjh esa lVhd
¼D½ Unilateral Resource Listing okD;ka'k [kkstus ;k fof'k"V dhoMZ ls esy [kkus
Ans.A % dh vuqefr nsrk gSa \
386- fdl ih<+h ds dEI;wVj esa VLSI rduhd dk ¼A½ OR
mi;ksx fd;k tkrk gS & ¼B½ AND
¼A½ First Generation ¼C½ NOT
¼B½ Second Generation ¼D½ Quotation marks ("")
¼C½ Third Generation Ans. D
¼D½ Fifth Generation Explenation %
Ans.D
392 dkSulh osc czkmtj lqfo/kk mi;ksxdrkvksa dks
,d fDyd ls viuh ialnhnk osclkbV rd Explenation %
igq¡pus dh vuqefr nsrh gS \ 397 opqZvy fj;fyVh flLVe esa gSfIVd QhMcSd
¼A½ Bookmarks fMokbl dk mn~ns'; D;k gS \
¼B½ Tabs ¼A½ To provide tactile sensations and
¼C½ Entenstions vibrations to enhance the user's sense of touch
¼D½ History ¼B½ to improve the clarity of visual displays.
Ans. A ¼C½ To control the rotation of 3D objects
Explenation % ¼D½ to record motion for animation purposes
393 baVjusV lapkj dks ,fUØIV djus vkSj lqjf{kr Ans. A
djus ds fy, fdl czkmtj ,DlVsad'ku vDlj Explenation %
,Mªsl ckj esa iSMykWd vkbdu ds :i esa ns[kk 398- dkSulh bZesy lqj{kk lqfo/kk vkids bZesy
tkrk gS \ [kkrs rd vuf/kd`r igqap dks jksdus esa enn
¼A½ Bookmarks djrh gS \
¼B½ Tabs ¼A½ Email forwarding
¼C½ Entensions ¼B½ Two-Factor authentication (2FA)
¼D½ Hisotry ¼C½ Email signature
Ans. A ¼D½ Email filtering
Explenation % Ans. B
394 izR;{k fcØh ekWMy esa fdl izdkj dk Explenation %
O;olk; eq[; :I ls bl ekWMy ds ek/;e ls 399- bZesy lapkj esa Read receipt dk mn~ns';
mRikn csprk gS \ D;k gS \
¼A½ Manufactures ¼A½ to automatically reply to all incoming
¼B½ Consumers emails
¼C½ E-commerce plaforms ¼B½ to notify the sender when the email has
¼D½ Retailers been opened and read
Ans. A ¼C½ to encrypt email message for added
Explenation % security
395 dkSulh bZ&dkWelZ ekWMy fcØh c<+kus ds fy, ¼D½ to sort emails into folders based on sender
eq[; :i ls mi;ksx drkZvksa tfur lkexzh vkSj Ans. B
flQkfj'kksa ij fuHkZj djrk gS \
¼A½ Subscription model
¼B½ Social Commerce
¼C½ Direct sales model
¼D½ Dropshipping model
Ans. B
Explenation %
396 baVjusV lapkj dks ,fUØIV djus vkSj lqfj{kr
djus ds fy, fdl czkmtj ,DlVsad'ku dk
mi;ksx fd;k tkrk gS] ftls vDlj ,Mªsl ckj esa
iSMykWd vkbdu ds :I esa ns[kk tkrk gS \
¼A½ HTTP ¼B½ SSL
¼C½ HTTPS ¼D½ TLS
Ans. C
This document was created with the Win2PDF “Print to PDF” printer available at
https://www.win2pdf.com
This version of Win2PDF 10 is for evaluation and non-commercial use only.
Visit https://www.win2pdf.com/trial/ for a 30 day trial license.
This page will not be added after purchasing Win2PDF.
https://www.win2pdf.com/purchase/

You might also like