0% found this document useful (0 votes)
116 views5 pages

Computer Set A

Uploaded by

reubenzmka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views5 pages

Computer Set A

Uploaded by

reubenzmka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

A A

GOVERNMENT OF MIZORAM GOVERNMENT OF MIZORAM

LOCAL ADMINISTRATION DEPARTMENT LOCAL ADMINISTRATION DEPARTMENT

EXAMINATION FOR RECRUITMENT EXAMINATION FOR RECRUITMENT


TO THE POST OF SA TO THE POST OF SA
2024 2024

PAPER II PAPER II
BASIC COMPUTER KNOWLEDGE BASIC COMPUTER KNOWLEDGE

FULL MARKS : 100 FULL MARKS : 100


TIME ALLOWED : 3 HOURS TIME ALLOWED : 3 HOURS

Candidate tana hriat tur Candidate tana hriat tur


1. A dik zawnah “ ” thai tur.. 1. A dik zawnah “ ” thai tur..
2. Thlan tur zingah hian answer dik pakhat chiah a 2. Thlan tur zingah hian answer dik pakhat chiah a
awm awm
3. Question tinin mark hnih zel a pu. 3. Question tinin mark hnih zel a pu.
4. A kawmah hian i Roll No. chiah ziak ang che. 4. A kawmah hian i Roll No. chiah ziak ang che.

Signature of Invigilator ___________ Signature of Invigilator ___________

CODE NO. CODE NO.


(LAD Office dah khah tur) ________ (LAD Office dah khah tur) ________

Marks Roll No. _______


No. of
carried by Marks
correct
one Obtained
answers
question

Chhanna endiktu signature __________


1. What does BIOS stand for? 8. What does "URL" stand for?
A) Basic Input Output System ( ) A) Uniform Resource Locator ( )
B) Binary Input Output System ( ) B) Uniform Research Language ( )
C) Base Input Output System ( ) C) Unique Resource Locator ( )
D) Basic Internal Output System ( ) D) User Resource Link ( )

2. Which protocol is used to send emails? 9. Which of the following keys is known as
A) FTP ( ) the “toggle key”?
B) HTTP ( ) A) Shift ( )
C) SMTP ( ) B) Ctrl ( )
D) SNMP ( ) C) Caps Lock ( )
D) Alt ( )
3. What is the main circuit board of a
computer called? 10. In Microsoft Word, what does the 'Ctrl +
A) CPU ( ) E' shortcut do?
B) Motherboard ( ) A) Aligns text to the left ( )
C) Hard Drive ( ) B) Aligns text to the right ( )
D) RAM ( ) C) Center aligns the text ( )
D) Saves the document ( )
4. Which of the following is NOT an example
of an output device? 11. In Microsoft Word, what is the use of the
A) Monitor ( ) 'Mail Merge' feature?
B) Keyboard ( ) A) To format a document ( )
C) Printer ( ) B) To check grammar ( )
D) Speaker ( ) C) To create a data table ( )
D) To send bulk letters with personalized
5. Which unit is used to measure the speed of details ( )
a processor?
A) Bytes ( ) 12. In Microsoft Excel, what symbol is used
B) Hertz ( ) to start a formula?
C) Bits ( ) A) $ ( )
D) Pixels ( ) B) @ ( )
C) = ( )
6. What is the purpose of a firewall in D) # ( )
computer networks?
A) Speed up the internet ( ) 13. In Excel, what does the 'VLOOKUP'
B) Protect against unauthorized access function do?
( ) A) Looks up a value in a vertical column
C) Improve system performance ( ) ( )
D) Store large amounts of data ( ) B) Counts the number of cells with
numbers ( )
7. Which of the following is the smallest unit C) Finds the maximum value in a range
of data in a computer? ( )
A) Byte ( ) D) Creates a pie chart ( )
B) Bit ( )
C) Kilobyte ( ) 14. Which shortcut key is used to start a
D) Megabyte ( ) slideshow from the beginning in PowerPoint?
A) F5 ( )
B) Ctrl + S ( )
C) Alt + F4 ( )
D) Shift + F5 ( )

Page 1 of 4
15. What does 'AI' stand for in the context of 21. What is the primary purpose of a DDoS
modern technology? attack?
A) Automated Interface ( ) A) Data encryption ( )
B) Artificial Intelligence ( ) B) Data theft ( )
C) Analog Input ( ) C) Overloading a system to cause
D) Advanced Internet ( ) disruption ( )
D) Data compression ( )
16. What is the main purpose of a
blockchain?
A) To create spreadsheets ( ) 22. What is "Phishing" in the context of
B) To encrypt email communications ( ) cybersecurity?
C) To store digital transactions securely in A) Sending spam emails ( )
a decentralized way ( ) B) Unauthorized access to networks ( )
D) To manage network printers ( ) C) Fraudulent attempt to obtain sensitive
information ( )
17. What is the shortcut key for 'Save As' in D) Downloading files illegally ( )
MS Word?
A) Ctrl + S ( ) 23. What is a "Router" used for in computer
B) Ctrl + A ( ) networks?
C) F12 ( ) A) Store data ( )
D) Ctrl + P ( ) B) Print documents ( )
C) Connect multiple networks and direct
18. What is the purpose of Slide Sorter view traffic ( )
in Microsoft PowerPoint? D) Edit video files ( )
A) To create a custom slideshow ( )
B) To rearrange slides ( ) 24. Which one of the following is NOT an
C) To add animations ( ) example of cloud computing service?
D) To insert a new slide ( ) A) Google Drive ( )
B) Dropbox ( )
19. Which technology is used for creating 3D C) External Hard Drive ( )
models and animations? D) Microsoft Azure ( )
A) CAD (Computer-Aided Design)( )
B) CAM (Computer-Aided 25. In database management, what does SQL
Manufacturing) ( ) stand for?
C) CNC (Computer Numerical Control) A) Simple Query Language ( )
( ) B) System Quality Language ( )
D) CAE (Computer-Aided Engineering) C) Structured Query Language ( )
( ) D) Server Query Link ( )

20. Which of the following storage devices 26. Which of the following is not a type of
has no moving parts? computer virus?
A) Hard Disk Drive (HDD) ( ) A) Trojan ( )
B) Solid State Drive (SSD) ( ) B) Worm ( )
C) CD-ROM ( ) C) Spyware ( )
D) Floppy Disk ( ) D) Firewall ( )

27. What does HTTP stand for in web


addresses?
A) Hyper Text Transfer Protocol ( )
B) Hyper Text Transmission Protocol ( )
C) Hyper Transfer Text Protocol ( )
D) Hyperlink Transfer Text Protocol ( )
Page 2 of 4
28. What is the default file extension for a 35. Which of the following is NOT an
Word document in recent versions? example of Artificial Intelligence?
A) .txt ( ) A) Voice assistants like Siri or Alexa ( )
B) .doc ( ) B) Automated email responses ( )
C) .docx ( ) C) Google search suggestions ( )
D) .pdf ( ) D) Traditional calculator ( )

29. In computing, what is 'Virtual Reality' 36. What is the main purpose of cache
(VR)? memory?
A) A programming language ( ) A) To store frequently accessed data and
B) A physical storage device ( ) instructions ( )
C) A simulation of a real or imagined B) To store the operating system ( )
environment ( ) C) To backup data ( )
D) A type of software virus ( ) D) To store multimedia files ( )

30. What does IoT stand for? 37. What is "IPv6"?


A) Internet of Technology ( ) A) A programming language ( )
B) Interconnected Objects Technology B) A version of the internet protocol with
( ) a larger address space ( )
C) Internet of Things ( ) C) A type of virus ( )
D) Intelligent Objects Technology ( ) D) A software license ( )

31. What is the primary function of a VPN 38. In computing, what does the term
(Virtual Private Network)? “booting” refer to?
A) Data encryption ( ) A) Installing software ( )
B) Internet speed enhancement ( ) B) Connecting to the internet ( )
C) Secure remote access ( ) C) Starting up a computer ( )
D) Data compression ( ) D) Shutting down a computer ( )

32. In computing, what does API stand for? 39. Which port is commonly used to connect
A) Application Programming Interface ( ) a keyboard to a computer?
B) Advanced Programming Interface ( ) A) USB ( )
C) Automated Programming Interface ( ) B) VGA ( )
D) Application Process Interface ( ) C) HDMI ( )
D) Ethernet ( )
33. What is the primary function of an IP
address? 40. What is the primary function of RAM
A) Encrypt files ( ) (Random Access Memory) in a computer?
B) Connect printers ( ) A) To store the operating system
C) Identify devices on a network ( ) permanently ( )
D) Control computer memory ( ) B) To store files for long-term use ( )
C) To provide temporary storage for
34. What does the term "Open Source currently used data and applications ( )
Software" mean? D) To control the computer's hardware
A) Software that is free for download ( ) components ( )
B) Software whose source code is
available for modification ( ) 41. What does "WWW" stand for?
C) Software that cannot be installed on A) World Wide Web ( )
multiple devices ( ) B) World Wide Way ( )
D) Software that requires a subscription C) Web Wide World ( )
( ) D) Wide Web World ( )

Page 3 of 4
42. Which of the following is an example of a 48. What is "multitasking" in computing?
search engine? A) Opening multiple windows
A) Facebook ( ) simultaneously ( )
B) Chrome ( ) B) Using a single program for multiple
C) Bing ( ) tasks ( )
D) Windows ( ) C) Running multiple applications at the
same time ( )
43. What does "cookies" in the context of a D) Creating multiple user accounts ( )
web browser do?
A) Speed up the computer ( ) 49. What does the term "formatting" refer to
B) Store user preferences and browsing when preparing a storage device?
history ( ) A) Compressing files ( )
C) Encrypt web traffic ( ) B) Installing software ( )
D) Increase video quality ( ) C) Removing and organizing files ( )
D) Preparing the device for data storage by
44. Which number system is used by erasing all data ( )
computers to perform calculations and
processes? 50. What is "clipboard" used for in a
A) Decimal ( ) computer?
B) Hexadecimal ( ) A) To save documents permanently ( )
C) Binary ( ) B) To temporarily store data for copying
D) Octal ( ) and pasting ( )
C) To manage installed software ( )
45. What is the primary purpose of a file D) To display web content ( )
extension in a computer system?
A) To improve the speed of file access
( )
B) To indicate the type of file and the
software that can open it ( )
C) To compress the file size ( )
D) To encrypt the file for security ( )

46. What is the main difference between a bit


and a byte?
A) A bit is 8 bytes ( )
B) A byte is 8 bits ( )
C) A bit is 16 bytes ( )
D) A byte is 16 bits ( )

47. What is the primary function of a


computer's "power supply unit" (PSU)?
A) To increase CPU speed ( )
B) To provide internet access ( )
C) To convert electrical power for
computer use ( )
D) To manage data storage ( )

Page 4 of 4

You might also like