0% found this document useful (0 votes)
33 views59 pages

Computer 800

Uploaded by

acharyksunil36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views59 pages

Computer 800

Uploaded by

acharyksunil36
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 59

COMPUTE

R
800 + ONE
LINER

Based on PYQ +
Exam Trend
Copyright @Samundragyaaneducationfoundation

MRP – RS.0/- ( Free for All)


Hello Bacchoooo …………..

I feel immense pleasure in presenting first content enriched edition of COMPUTER


RAPID FIRE 800+ One Liner to the esteemed readers.

We have a great pleasure in presenting this book according to the new trends of various
competitive exams. This Book covers a wide range of Computer in a single concise
volume. Apart from extensive coverage , we have recognised three main priorities :
accurate & up – to – date information ; concise & lucid language ; and clear – cut
presentation

Each chapter of the book has been compiled with utmost care well – informed persons .
We are quite confident that this book will cater to the needs of a wide range of readers.

Despite having taken all care , some typing error might be there in the book . Hence
valuable suggestions and comments of the readers , teachers and wellwishers are
solicited. The feedback will certainly helps us in further improving the book in
subsequent editions.

We are thankful to our team who has taken great pains to bring out this book. We also
express our sincere gratitude to the our friends , family members and all our
wellwishers for their suggestions , sincere support and kind co-operation.

If this book proves to be helpful in your success , then surely it will be a proud moment
for us .

Good Luck !!

Team , SAMUNDRAGYAAN EDUCATION FOUNDATION


SSC CGL 2024 / SSC MTS 2024 Day 29 : Free 90 Days Revision Series
Topic : Computer & its Types , Generations

Topic : Computer & its Types Notable supercomputers in the world include Fugaku (Japan),
1. The first digital computer built using
integrated circuits is known as IBM
System/360.

2. Based on its memory size and performance, Supercomputers in India include AIRAWAT, PARAM Siddhi-AI,
the type of computers known as "Big Iron" are
Mainframe Computers

8. The Apple monochrome logo was


Examples of Mainframe Computers include
introduced in 1998.
UNIVAC, ENIAC, ASCC (Automatic Sequence
Control Computer), IBM Z, and FUJITSU 9. The developer of PARAM 10000 is C-DAC
Server GS21 ) Pune.
3. The first mini computer was PDP-8.
10. The first mechanical computer designed
4. There are three basic categories of physical by Charles Babbage was called the Analytical
equipment in microcomputer hardware: Engine.
System Unit, Input/Output, and Secondary
11. If Bill Gates had his way, Windows OS
Storage.
would have been called 'Interface Manager'.
5. PARAM is an example of a Supercomputer.
12. The name of the first electronic digital
6. The PARAM 8000 was released in 1991. computer in the world is ENIAC.

7. PARAM Siddhi refers to an Artificial 13. A microcomputer designed for use by one
Intelligence- Supercomputer. person at a time is a Personal Computer.

14. Desktop computers, laptops, notebooks,


and tablets are types of Personal Computers.
SSC CGL 2024 / SSC MTS 2024 Day 29 : Free 90 Days Revision Series
Topic : Computer & its Types , Generations

15. Computers used to control air traffic and 24. The first analogue computer was designed
radar for national defense are Hybrid by Samarendra Kumar Mitra.
Computers.
25. Slide rules, differential analysers, and
16. Thermometers, speedometers, analogue castle clocks are types of Analogue
clocks, seismometers, voltmeters, and flight Computers.
simulators are examples of Analogue
Computers. 26. India’s first supercomputer is PARAM
8000.
17. An electrocardiogram machine is
an example of Hybrid Computers. 27. Mac is a type of personal computer made
by Apple.
18. Any hardware or software systems with a
biological component, or biological systems 28. A computer that uses continuously
that function like software and hardware, is changeable entities like mechanical, electrical,
referred to as Wetware. hydraulic, etc., is an Analogue Computer.

19. 'Wetware' specifically refers to the human 29. A mercury thermometer is an example of
brain. an Analogue Computer.

20. Desktop computers, laptop computers, 30. A computer that uses resistors for the flow
tablets, and smartphones are different types of continuous signals is an Analogue
of microcomputers. Computer.

21. Computers used in hospitals to measure 31. Digital computers are systems/machines
the heartbeats of patients are Hybrid that use the binary number system, which has
Computers. two digits: 0 and 1.

22. Computers used in climate research 32. A computer that combines a large amount
and weather forecasting are of memory (RAM) and multiple processors is a
Supercomputers. Mainframe Computer.

23. The father of supercomputing is Seymour


Cray.
SSC CGL 2024 / SSC MTS 2024 Day 29 : Free 90 Days Revision Series
Topic : Computer & its Types , Generations

33. A single-user, high-performing computer 6. EDVAC (Electronic Discrete Variable


created for technical or scientific applications Automatic Computer) was from which
is a Workstation. Generations of computers - First

34. Digital Computers were developed in 7. IBM 1401, IBM 7090 - 2nd Generation
the USA.
8. IBM 360 was developed in which
Examples of Digital Computers include generation of computer - Third
calculators, digital clocks, weighing
9. PARAM supercomputer belongs to - Fifth
machines, automobiles, smartphones,
generation
personal digital assistants, and
Topic : Generations of 10. The other name for transistor computer -
Computers second generation computer

1. An example of 3rd generation programming 11. The most important advantage of


language - COBOL Integrated circuit is its - reduced costs

2. SEAC, ENIAC, EDVAC, UNIVAC, IBM- 12. Vacuum Tubes were used by - First
701, and IBM-650 are examples of - First Generations of Computer
Generation Computer
13. ENIAC, UNIVAC, IBM 705 are the examples
3. The second generation computers of - 1st Generations Computers
were based on - Transistors
14. IBM 1620, IBM 7094, CDC 1604, CDC 3600,
4. IBM 370 is an example of - 3rd Generation UNIVAC 1108 - 2nd Generations
computer
15. IBM-360 series, Honeywell-6000 series -
5. EDSAC (Electronic Delay Storage 3rd Generation
Automatic Calculator) was from which
16. DEC 10, STAR 1000, PDP 11, CRAY-1
Generations of computers - First
(Supercomputer) - 4th Generations

17. UNIVAC 1107 - 2nd Generation


SSC CGL 2024 / SSC MTS 2024 Day 29 : Free 90 Days Revision Series
Topic : Computer & its Types , Generations

18. Language used in the first generation of 10. Magnetic Tape is a - Sequential Access
the computer technology - machine language Memory

Topic : Input/ Output Devices 11. Device used for direct input of printed text
- MICR
1. A computer input device for controlling
the pointer on a display screen by rotating a 12. Device used to recognize a pre-specified
ball set inside a case is a - trackball type of mark by pencil or pen is - Optical Mark
Reader
2. The line, daisy wheel, ledger, and drum are
- types of Printers 13. Instructions to computer are given
through - Input Units
3. A typewriter-like tool, which is used to send
data or commands to the computer is called - 14. Dot Matrix Printer is a - Character Printer
Keyboard
15. Speed of Dot Matrix printer is measured in
4. The smallest resolvable part of a picture is - - characters per second (CPS)
a pixel
16. A combination of the laser beam and
5. A stylus is a pointing and drawing electrophotographic techniques is used in - A
instrument with a pen-like shape used on - laser printer
touch screens
17. An input device used to read a printed text
6. The process of enabling a computer to is - Optical Character Reader
identify and respond to the sounds produced
in human speech is - speech recognition 18. A computer input device that enables a
user to hand-draw images, animations and
7. Device which performs the function of both graphics is - graphics tablet
Input and Output device is - Modem
19. A input device which functions as a cursor
8. The equipment attached to CPU which control device predominantly used in gaming
computer can access are called - Peripherals and assistive technology - Joystick

9. Inkjet printer is a - Non Impact Printer


SSC CGL 2024 / SSC MTS 2024 Day 29 : Free 90 Days Revision Series
Topic : Computer & its Types , Generations

20. A technology used to verify the legitimacy


Non Impact Printer - Laser Printer,
or originality of paper documents, especially
Inkjet Printer, Thermal Printer
checks is - MICR (Magnetic Ink Character
recognition) 27. The unit used to count the speed of
modern printers is - PPM (Pages Per Minute)
21. A graphic printer which draws images
with automated ink pens is - Plotter 28. An input device that scans documents
such as photographs and text pages is -
22. Laser, Inkjet, Dot Matrix are types of - Scanner
Printers
29. Monitors, keyboards, speakers, printers,
23. A type of printer that works by direct scanners are - external part of computer
contact of an ink ribbon with paper - Impact
printer 30. Plotter, printer and monitor are - Output
device
Impact
Printer 31. Color depth values used in 16-bit
computer monitor display are - 65,536 colors
Character Printer - Daisy wheel Printer,
Dot Matrix Printer, Note: Color depth values : 8-bit (256
colors), 24-bit (16.7 million colors).
Line Printer - Drum Printer, Chain Printer
32. A computer monitor is also known as -
24. Optical character reader is a - Input device Visual Display Unit (VDU)

25. Inkjet printer, Headphone, Projector are 33. Function keys present on a standard PC
- Output devices Keyboard is - 12

26. Type of printer which do not depend on 34. The smallest illuminated area on a
direct physical contact with the paper to computer screen is - Pixel
produce output is - Non Impact Printer
36. Touchscreen is an example of - Input
device
SSC CGL 2024 / SSC MTS 2024 Day 29 : Free 90 Days Revision Series
Topic : Computer & its Types , Generations

37. The device that receives data from one


source and converts it into another form -
Output devices

Input Devices - Mouse, Keyboard, Joystick,


Light pen, Trackball, Scanner, Microphone,
Webcam, Barcode Reader, Magnetic Ink
Character Reader, Optical Character Reader

Output Devices - Monitor, Printer, Plotter,


Speakers, Headphones, Projector, GPS,
Sound Card, Video Card, Braille Reader,
Speech- Generating Device, Microfiche.
SSC CGL 2024 / SSC MTS 2024 Day 30 : Free 90 Days Revision Series
Topic : CPU , Software & Hardware , Memory

Topic : Central Processing 10. Program Counter register is an integral


Unit part of - CPU
1. If we want to improve the performance of 11. CPU registers which contain the address of
our PC, we need to upgrade - CPU the next instruction to be executed - Program
2. Internal storage provided to the CPU is by - Counter
Registers 12. MFLOPS (Million of Floating-point
3. The four basic tasks performed by CPU - Operations Per Second) is a common measure
Fetch, decode, Manipulate and Output of the performance of a - computer system or
microprocessor
4. Switching the CPU to another process
requires performing a state save of the 13. The central processing unit (CPU)
current process and a state restore of a operating mode is also known as - Kernel
different process. This task is known as - mode
Context Switch
14. The clock speed of a CPU is measured in -
5. Output ports in peripheral I/O are - 256 Gigahertz (GHz)

6. A microprocessor with 8-bit word length 15. The main printed circuit board in a
can process - 8 bits data simultaneously computer is - motherboard

7. Bus which carries control information 16. That part of the CPU which controls the
between the CPU and other devices within operations of the processor is - control unit
the computer - Control Bus 17. CPU and RAM connected directly to -
8. Snapdragon, Atom Tegra, Helios and Zynos Motherboard
are - Processors 18. A high-speed device used in CPU that is
9. A register in a computer processor that utilized to store data temporarily during
contains the address (location) of the processing is - Registers
instruction being executed at the current time
is - Program Counter Register
SSC CGL 2024 / SSC MTS 2024 Day 30 : Free 90 Days Revision Series
Topic : CPU , Software & Hardware , Memory

19. The instruction that is not to be executed 28. Intel core i9 is a type of - Processor
immediately is placed in - Instruction Buffer
Register 29. The brain of any computer system is - CPU

20. The oldest type of Central Processing Unit 30. A single chip-based device that is capable
(CPU) - Single Core of performing arithmetic and logical
operations is - Microprocessor
21. In Instruction cycle, the register that
holds the last instruction fetched is - 31. The cache memory is located in - CPU
Instruction Register (IR)
32. The three constituents of a CPU in a
22. A special type of register that contains the computer are - Control Unit, ALU, and
memory address of the data and instruction is Memory
- Memory Address Register
33. The part of a CPU that coordinates all the
23. The company that manufactured the first functions of a computer is - Control Unit
microprocessor (4004) was - INTEL
34. The speed of a CPU can be measured in -
Corporation
Megahertz (MHz)
24. Central Processing Unit (CPU) speed is
35. RAM (Random Access Memory) acts as an
measured in - Hertz (Hz)
internal memory of - the CPU
25. Intel, Pentium, IBM RS6000, DEC Alpha
36. RAM is a hardware device generally
21064, Intel Architecture-64 are examples of -
located on - the motherboard
Microprocessor
37. The processing unit of the computer is -
26. The time taken by the CPU to access a
Central Processing Unit
location in memory is referred to as - Memory
access time 38. Storage Device which directly interacts
with CPU - Primary Storage
27. A sequence of steps that a CPU follows
to execute a single instruction is called - An 39. In computer registers, MAR stands for -
instruction cycle Memory Address Register
SSC CGL 2024 / SSC MTS 2024 Day 30 : Free 90 Days Revision Series
Topic : CPU , Software & Hardware , Memory

40. Component of the CPU which maintains 8. Excel, Word, and PowerPoint are the
and regulates the flow of information across applications of - Microsoft Office
the processor is - Control Unit
9. Microsoft Office is a - Closed source
Topic : Softwares/ Hardwares software

1. Modern computers follow a set of 10. The component added to the functionality
instructions to perform any task, and these of a software program is called a - plug-in
instructions are known as - Programs
11. A collection of interrelated files and a set
2. MS Office 2019 is available for both of programs that allow users to access and
Windows and macOS, and includes classic modify these files is known as - Database
versions of - Word, Excel, PowerPoint, and management systems (DBMS)
Outlook
12. The simple query language used for
3. In a computer, a menu contains a list of - accessing, handling, and managing data in a
commands relational database is - SQL (Structured Query
Language)
4. In the context of computing, a 'spider' is - a
program that catalogs websites 13. Some examples of database software in
computers are - MS Access, Oracle, and
5. A malicious software that is used to steal
Foxpro
private information from people's computers
by installing it - Spyware 14. Disk defragmenter is a - Computer utility
program
6. A type of malware that hides on
the computer and delivers targeted 15. PS/2 port is also called as - mouse port
advertisements - Adware
16. GIMP is an - application software
7. An unwanted application not necessarily
malicious that can cause moderate to severe 17. Software program that travels the web
annoyance to users - Grayware locating and indexing websites for search
engines is - spider
SSC CGL 2024 / SSC MTS 2024 Day 30 : Free 90 Days Revision Series
Topic : CPU , Software & Hardware , Memory

18. CorelDraw is an example of a - 27. Port used to connect a computer to a


Desktop publishing software wired network is - Ethernet Port

19. Digitizer converts analog information into 28. A mini-DIN connector used to connect
- digital form keyboard and mouse to a computer is called -
PS/2 port
20. Program that duplicates the functionality
of one system on another system is known as 29. A type of software that is created to do a
- Emulators certain set of tasks is - Application Software

21. Program for executing computer games is 30. dBase is a - Database software
- simulator
31. Video Graphics Array connectors, which
22. A program to measure the performance connect the monitor to a computer's video
of a computer is - Evaluator card, has - 15 holes

23. An electronic assembly that uses copper 32. Line Printer Port is also known as - Parallel
conductors to create electrical connections port
between components is - Printed circuit board
(PCB) 33. A serial communication interface through
which information transfers in or out
24. The computer program that converts sequentially one bit at a time is called - Serial
Assembly language to machine language is port
called - Assembler
Note
34. : Serial
Printer, Port (Twoand
Keyboard, versions:
Mouse9for
pin,
a 25
25. The set of instructions forming a
pin modelare - hardware components
computer
program which is executed by a computer is
called a - code 35. A computer program that converts an
entire program into machine language is
26. A screen in a software program that
called - Compiler
allows the user to view multiple programs at a
time is called - window
SSC CGL 2024 / SSC MTS 2024 Day 30 : Free 90 Days Revision Series
Topic : CPU , Software & Hardware , Memory

36. An ERP accounting software package used 2. The average time required to reach a
for recording day-to-day business data of a storage location in memory and obtain its
company is - Tally contents is called the - Access time

37. ERP stands for - Enterprise 3. A hard disk is a type of - secondary storage
Resource Planning device

38. Internal or external devices that connect 4. A computer memory that can store
directly to a computer but do not information even after power is removed is -
contribute to the computer’s primary Non-volatile memory
functions are - peripheral devices
5. ROM, EPROM, EEPROM are examples of -
39. A simple program that allows users Non-volatile memory
to create basic graphic art on a computer
is called - Microsoft Paint 6. RAM (Random Access Memory) is located in
- Motherboard
40. MS-Word, MS-Access, and MS-Excel are
integral components of - MS Office 365 suite 7. The primary memory of a computer is -
RAM and ROM
41. Graphics is an - Application software
8. The capacity of a 3.5-inch floppy disk is -
Note: Types of Application Software - 1.44 MB
Word Processing Software, Spreadsheet
9. ROM is composed of - Integrated circuits
Software, Presentation Software, Web
Browser, Educational Software, Graphics 10. The physical location where the computer
Topic : Memory stores information is called - Hard disk

1. A computer memory chip that can be 11. A group of 8 bits is called - byte
programmed once after it is created is - PROM 12. 1 Petabyte is equal to - 1024 TB
(Programmable Read Only Memory)
13. A nibble is equal to - Half a byte (4 bits)
SSC CGL 2024 / SSC MTS 2024 Day 30 : Free 90 Days Revision Series
Topic : CPU , Software & Hardware , Memory

14. Different values a 32-bit register can store 23. The area of computer memory where
is - 2^32 repeatedly accessed data can be stored for
fast access is - Cache
15. In the context of computing, the
correct order is - TB > GB > MB > KB 24. A very high-speed semiconductor memory
which can speed up the CPU is - Cache
16. 10 nibbles are equal to - 40 bits
Memory

1 nibble= 4 bits, So, 10 nibbles = 10 × 4= 25. Cache memory acts between - CPU & RAM
40 bits
26. The buffer used to adjust the speed
17. The purpose of virtual memory in a
difference is called - cache
computer is to increase the effective -
Capacity of RAM 27. The unit of measurement of word length is
- byte
18. Instructions in computer memory include -
Opcodes and operands 28. The read-only memory that can be erased
by exposing it to an electrical charge and can
19. The method for updating the main
be reprogrammed is - EEPROM (Electrically
memory as soon as a word is removed
Erasable Programmable Read Only Memory)
from the cache is called - write-back
29. Both SRAM and DRAM are types of -
20. When the program arrives at a page that is
Random Access Memory (RAM)
not in the main memory at that time - the
page fault occurs 30. The process of taking out stored results
out of physical memory of computers is
21. Circuit used to store one bit of data is -
known as - Output process
FlipFlop
31. The lowest-cost, highest-space, and
22. An example of Electrically-Erasable
slowest-approach storage in a computer
Programmable Read Only Memory is - Flash
system is referred to as - auxiliary memories
Memory
SSC CGL 2024 / SSC MTS 2024 Day 30 : Free 90 Days Revision Series
Topic : CPU , Software & Hardware , Memory

Examples of Auxiliary memory - Magnetic 39. 'Nibble' in computer terminology is also


tapes, Floppy, CD-ROM and Magnetic called - Half byte (4 bits)
disks. Auxiliary memory is known as 40. A flash drive is popularly known as a - pen
Secondary storage. drive
32. The primary storage device on the
41. Blu-ray disc, CD ROM, DVD are examples
personal computer is - Random Access
of - Optical disc
Memory (RAM)
42. Cache memory works on the principle of -
33. The diameter of a Blu-ray Disc is - 120 mm
Locality of reference
34. A type of computer memory that
43. The data most frequently used by the CPU
stores permanent data and instructions for
is stored in - Cache memory
the device to start up is - ROM
44. Solid-State Drive is also known as -
35. Providing temporary storage for data that
electronic disk
the CPU is currently processing is the primary
purpose of - RAM (Random Access Memory) 45. Memory system that temporarily stores
frequently used instructions and data is -
Types of Random Access Memory (RAM) - Cache memory
Static RAM (SRAM) and Dynamic RAM
46. A backup device that allows easy backups
36. Devices that store and share data for
but might take longer for restoration is - Tape
multiple computers, that can be accessed
drive
remotely are - Network attached storage
(NAS) 47. The pie-shaped wedge on a track in a hard
disk drive is referred to as a - Sector
37. Flash drive is also known as a - Pendrive
48. The circular magnetic plate used for
38. Disk pack, Winchester disk, Zip disk are -
storing data in a hard disk is called - Platter
Magnetic disk
49. 1 terabyte per second is - 2 bytes per
second
SSC CGL 2024 / SSC MTS 2024 Day 30 : Free 90 Days Revision Series
Topic : CPU , Software & Hardware , Memory

50. One Megabyte (MB) is - 1024 Kilobytes

51. 1024 terabytes make one - petabyte

52. Computer memory that is non-volatile,


persistent and not immediately accessible -
Secondary memory

Secondary Memory- Hard Disk Drive, CD,


DVDs, Blu -ray discs, Memory cards,
Floppy Discs, Magnetic tapes, punched
tapes, punched cards, Solid state drive,
flash memory.
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

Topic : Operating System 10. One strategy of allocating kernel memory


is known as - slab allocation
1. A startup sequence that starts the
operating system of a computer when it is 11. Unix Operating system was developed in
turned on is called - Booting 1970s by - Bell Labs
2. A program that converts the source code 12. The mascot of Linux operating system is -
to the object code is called - Compiler Penguin
3. A program that converts assembly 13. The operating system launched by Chinese
language into machine code is called - An company Huawei is - Harmony OS
assembler
14. Systems running more than one process
4. A programming language processor concurrently are called - multiprocessing
that converts a computer program from
one language to another is - translator 15. Constantly running system-programme
processes is known as - Daemons
5. Linux, Unix, Ubuntu, and Windows are
examples of - multi-user operating systems 16. MS-DOS is an operating system that has a
- Command Line Interface (CLI)
6. In process management of operating
system, a process changes its state when it is - 17. Indicators on a computer display screen
executed that are used by the user for data input and
standard screen navigation are called - cursor
7. An example of single-user and single-task
and command line user interface operating 18. Cupcake, Donut, Eclair, Froyo and
system - MS-DOS Gingerbread are codenames for - Android
versions
8. The process where different tasks get
executed at pre-determined time or when the 19. An interface between the human user and
right event happens - Job Scheduling the computer hardware is known as -
Operating system
9. In IT, associative memory is called as -
Content Addressable Memory
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

27. An operating system that runs multi-


Note: Examples of Operating Systems
threaded applications and can meet real-time
are Microsoft Windows, Android, iOS,
deadlines is - Real-time operating system
MacOS, Chrome OS, Ubuntu, Linux.

20. System acts as the interface between 28. An OS that is designed to facilitate real-
the user and the system hardware - time interaction between the user and the
Operating system system is - Interactive operating system

21. Ubuntu, Linux and Drupal are - 29. The switching between processes that are
Open- source Operating System being executed refers to - CPU scheduling

22. An event where a computer becomes 30. CPU Scheduler is also known as - Short-
unresponsive due to either a program or the term Scheduler
system itself becoming unresponsive and no
31. Operating system of a computer is an
longer taking input is called a - hang
example of - System software
23. A startup sequence that starts the
operating system of a computer when it is Note:
32. Examples
A suite of System
of desktop software:
productivity
turned on is - Booting Device drivers,
applications thatFirmware, Utility
are designed specifically to
software,
be used forprogramming language
office or business use is -
24. Core of an operating system is - Kernel Microsoft Office

25. Operating system which utilizes multiple


Note:
33. Microsoft
Linux is - OpenOffice
sourceApplications -
operating system
processors and virtual machines, enabling
Word, Excel, PowerPoint, OneNote,
simultaneous access to multiple applications
for users - Time sharing

26. Operating System where applications are


running on multiple computers linked by
communications - Distributed Operating
System
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

10. Button key on the windows keyboard


Note: Open source operating system
which opens the help page in the program -
examples: Ubuntu, FreeBSD, Fedora Linux,
F1
Chrome OS, Android, Haiku, Darwin,
CentOS, gentoo Linux. 11. Shortcut to search for a file or folder in
Topic : Microsoft Windows File Explorer is - F3

1. wma (Windows Media Audio) is a - Audio 12. Shortcut used to cut the selected item -
file extension Ctrl + X

2. ‘psd’ is a file extension for which type of 13. Shortcut used to close the active item - Alt
computer file? - Adobe PhotoShop + F4

3. A PNG (Portable Network Graphic) file is an 14. Function key which displays the address
- Image file bar list in File Explorer is - F4

4. The shortcut key which is used to lock a 15. Function key used to refresh the active
Windows 10 PC - Windows logo key + L window - F5

5. Shortcut key which is used to switch 16. A graphical interface that allows users to
between open applications in a Windows 10 manage settings and features in the Windows
system - Alt + Tab operating system is - Control Panel

6. Shortcut key that is used to switch to a 17. A virtual assistant introduced in Windows
previously opened program - Alt + Shift + Tab 10 that accepts voice commands is - Cortana

7. The function key used to change the name 18. A space where we can organize
of a specific file is - F2 applications, folders, and documents, which
appear as icons - Desktop
8. Start menu in a standard personal
computer is an option and - set of commands 19. The built-in browser in Windows 10 is
called - Microsoft Edge
9. The process of sharing disk into tracks and
sectors is called - formatting 20. Windows 10 was introduced in - 2015
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

21. Windows 11 was introduced in - 2021 33. Shortcut key is used to open the Design
Tab - Alt + G
22. The first version of Windows was launched
in - 1985 34. The taskbar placed in Microsoft Windows
in the default settings is - at the bottom of the
23. Windows Operating system was
screen
developed by - Microsoft
35. The database used by Microsoft Windows
24. Narrow vertical bar on the left edge of the
to store configuration information is - Registry
Outlook window is - Navigation Pane
36. A three or four letter abbreviation that
25. Shortcut can be used to open
signifies the file type is - Extensions
Windows Explorer - Window key + E
37. .png extension is of - image file
26. Shortcut to open properties for selected
items on a Windows 10 home screen - Alt + 38. Brand of computers which first used the
Enter combination of GUI and mouse together was -
Macintosh
27. The keyboard shortcut for 'Copy' in most
Windows applications is - Ctrl + C 39. The smallest pictorial representation of
software on the screen is called - icon
28. An extension of a temporary file is - .tmp
40. In Windows, if an icon has a slightly curved
29. Image file has Extension - .png
arrow on it, it represents - Shortcut icon
30. Key to move the pointer around on the
41. The shortcut key used to create a new
screen - Navigation key
folder in Windows - Ctrl + Shift + N
31. Shortcut to minimize all programs on a
42. In File Explorer of Windows 10, the
computer screen - Windows + D
keyboard shortcut used to display all
32. Shortcut to insert a new worksheet for subfolders under the selected folder is - Num
Windows 10 in Microsoft Excel 2016 - Shift + Lock + Asterisk sign (*)
F11
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

43. In File Explorer of Windows 11, the Topic : MS Excel


'hidden items' option can be found under the
- 'View' tab 1. The keyboard shortcuts used to rename the
table in MS-Excel 2010 is - Ctrl + R
44. In MS Office 365, the Page Setup dialog
box is under - Layout 2. The shortcut key used in MS-Excel 2010 to
go to the view tab is - Alt + W
45. Shortcut used to display and hide the
desktop in Windows 10 is - Windows logo key 3. The shortcut key for replacing text within
+D the sheet in MS-Excel 2010 is - Ctrl + H

46. Shortcut key is used to switch 4. The shortcut key for inserting a new
between open apps in Windows 10 - Alt + worksheet in an existing MS Excel 2010
Tab workbook is - Shift + F11

47. Shortcut key to lock the Windows screen 5. The shortcut key for moving to the previous
in Windows 10 - Windows logo key + L sheet in MS Excel 2010 is - Ctrl + Page Up

48. Microsoft Windows is Graphical User 6. The function key for running spell check in
Interface based - Operating System MS-Word 2010 is - F7

49. A powerful encryption feature that 7. The shortcut key for adding an outline to
provides a simple and effective way to protect selected cells in a worksheet of MS-Excel 2010
sensitive data on Windows-based computers is - Ctrl + Shift + Ampersand sign (&)
is - BitLocker
8. The shortcut key for starting a new line of
50. Moving an object around by clicking on it text or adding spacing between lines or
with the mouse is called - Dragging paragraphs in MS Excel 2010 is - Alt + Enter

51. Windows Explorer user interface is divided 9. The function key for closing a workbook in
into - two parts MS Excel 2010 is - Ctrl + F4

10. The hide option on MS Excel 2010 ribbon


Interface are of two types :- Command
bar is present in - the View tab
Line and Graphical User
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

11. The feature that allows us to quickly and 20. Rows in MS-Excel 2010 are identified by -
automatically calculate the sum of a range of 1, 2, and 3
numbers is - AutoSum
21. The Data validation option in the MS Excel
12. The tab in MS-Excel 2010 ribbon bar that 2010 ribbon bar is present in - the Data tab
contains tools for inserting functions, defining
names, and controlling the calculation options 22. The maximum zoom percentage in MS
is - Formula tab Excel 2010 application is - 500%

13. In MS-Excel 2010, the tool used to make a 23. The feature of MS Excel that is used to
graphical representation of any set of data is - quickly copy and paste content to adjacent
Charts cells in the same row or column is - Fill handle

14. The header and footer option is present in 24. The Zoom option in MS Excel appears in -
the MS-Excel 2010 ribbon bar in - Insert tab Status bar

15. In MS-Excel 2010, the operation used 25. The function in MS-Excel 2010 that returns
to save an already saved file under a the total number of characters in a string is -
different name is - Save As LEN Function

16. The tab in MS-Excel 2010 ribbon bar that 26. The function in MS-Excel that changes all
allows you to check spelling, track changes, the characters of the text to uppercase is -
add comments and notes, and protect UPPER Function
worksheets and workbooks is - Review tab
27. The function in MS Excel 2010 that
17. The references used when you want to fix capitalizes the first letter in each word of a
a cell location are - Absolute references text value is - PROPER function

18. The "ƒx" button in MS-Excel 2010 28. The function in MS-Excel 2007 that
represents the - Insert function operation removes all non-printable characters from the
text is - CLEAN function
19. Columns in MS-Excel 2010 are identified
by - A, B, and C 29. All Excel formulas begin with an - equal
sign (=)
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

30. The function in MS-Excel that counts how 38. The default alignment of numbers in an
many values are in the list of arguments is - Excel worksheet is - Right
COUNTA function
39. The default vertical alignment of texts in
31. The function in MS-Excel 2007 that checks an Excel worksheet is - Bottom
if any argument is true; returns FALSE if all are
false is - OR function 40. In an Excel worksheet, the content of the
active cell is displayed in - Formula bar
32. The function in MS-Excel 2010 that
provides only the current system date is - 41. The address of the cell in the seventh
TODAY Function column of the sixth row in an MS-Excel
worksheet is - G6
33. The function in MS-Excel 2010 that
provides only the current system date and 42. The character used to create an absolute
time is - NOW function address in MS-Excel is - Dollar ($)

34. The function in MS-Excel 2010 for 43. By default, how many worksheets are
rounding the number down is - FLOOR present in the workbook of Excel MS Office
function 2010 is - 3

35. The function in MS-Excel 2010 that 44. An example of a spreadsheet is - Microsoft
calculates the year corresponding to a date is Excel
the - YEAR function
45. The cell with a dark boundary in MS Excel
36. The function in MS-Excel 2007 that returns is called - an active cell
the absolute value of a number is - ABS
46. Quattro Pro is a type of - spreadsheet
function
software
37. In Microsoft Excel 2016, the function that
47. The function key in Excel that helps to
helps to combine or join text from multiple
switch to edit mode is - F2
cells into one cell is - CONCATENATE function
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

48. The shortcut key that is used to fill the 57. The feature used in MS Excel to visually
selected cells with active cells to the right in represent data through graphical
Excel is - Ctrl + R representation is called - Charts

49. The default print range in Microsoft Excel 58. In MS Excel 365, the default row height
365, when printing an entire worksheet is - and column width, respectively, are - 15 and
Active Sheet 8.43

50. The shortcut key to select an entire row in 59. In MS Excel 365, a contour map is an
MS Excel is - Shift + Spacebar example of - Surface Chart

51. The shortcut key used in MS Excel 365 60. A predefined formula that performs
to make the cell in edit mode is - F2 calculations using values in a specific order in
MS Excel 365 is called - Function
52. The function in MS Excel 365 which
removes irregular spacing, leaving one space 61. In Microsoft Excel 365, the cell address of
between each value is - TRIM the intersection between column L and row
26 is - L26
53. In MS Excel 365, the term for the area
that contains specific and formatted data in 62. The purpose of the Undo Command in MS
MS Excel for printing is - Print area Excel is to - Reverse the last action performed

54. In MS Excel 365, the keyboard shortcut 63. In MS Excel 365, the chart used to show
keys used to insert a new row is - Ctrl + Shift + the change of magnitude over a period of
+ (plus key) time is called - Area Chart

55. In Excel, the feature used to change 64. The keyboard shortcut used to auto fit
the appearance of cells in a range based on row height manually in MS Excel 365 is - Alt +
specified conditions is called - Conditional H+O+H
formatting
65. In MS Excel, we highlight an entire column
56. The function used to display the current by pressing - Ctrl + Spacebar
date in MS-Excel 365 is - TODAY()
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

66. In MS Excel 365, we can sort data in 75. Each cell in a worksheet of MS-Excel 365 is
ascending or descending order by - Data -> identified by a - cell address or cell reference
Sort
76. The shortcut to quickly create a new,
67. The chart type best suited for showing blank workbook in MS-Excel 2010 is - Ctrl + N
trends over time is - Line Chart
77. An Excel function used to locate the
68. The correct syntax for writing position of a lookup value in a row, column, or
SUMIF() function in MS Excel is - SUMIF table is - MATCH function
(range, criteria, [sum_range])
78. In MS Excel 2010, a shortcut to select the
69. The correct syntax to enter a date in MS- current row is - Shift + Space
Excel 365 is =DATE(year, month, day)
79. The shortcut to add a new row above a
70. A simple function in MS Excel 365 that given row in Microsoft Excel is - Alt + I + R
raises the given number to an exponent is -
POWER 80. The symbols used before a formula in a
Microsoft Excel sheet is - ‘=’
71. In MS Excel, letters of the alphabet
are used to define - Column 81. Pivot table is a feature of - MS Excel

72. The option in MS Excel that allows us to A PivotTable


82. is a powerful
The sign which appears tool
whentowe
calculate,
drag the
create a custom bullet style for a bulleted list summarize,
fill andcreating
handle while analyze text,
data number,
that lets and
you
is - Define New Bullet data series in MS Excel 365 is - + (plus) in
see comparisons, patterns, and trends
your data.
73. Provides access to all spreadsheet 83. In MS Excel 365, the function used to find
commands and features in MS-Excel 365 - the smallest value in a range of cells is - MIN
Ribbon

74. ABS, BASE, COMBINE, LOG, FACT, SIN,


TAN are Math and trigonometric functions
available in - MS-Excel 365
SSC CGL 2024 / SSC MTS 2024 Day 31 : Free 90 Days Revision Series
Topic : Operating System , Windows , MS Excel

84. In MS Excel 365, the correct formula to 94. The software used to create financial
calculate the average of the values in cells A1 statements is - Spreadsheet
to A10 is - =AVERAGE(A1:A10)
95. The shortcut key used to start a new line
85. In MS Excel 365, the Sort & Filter group in the same cell in MS-Excel 365 is - Alt + Enter
is available under - Data tab
96. The shortcut key to make the contents of
86. The maximum number of columns existing a cell italic in MS-Excel 365 is - Ctrl + 3
in MS Excel 2010 is - 16,384
CtrlIn MS-Excel
97. + 3 Applies
365, theorshortcuts
removesuseditalic
to
87. In MS Excel, the shortcut key to
formatting.
copy Ctrl +and
the contents 2 format
Appliesoforthe removes
topmost
open custom sort is - Alt + A + S
bold
cell of aformatting. Ctrlis -+Ctrl
selected range 4 +Applies
D or
88. In MS Excel, workbooks or files are saved removes underline.
by default as - Excel Workbooks (.xlsx) Ctrl + 6 Alternates between hiding
and displaying objects
89. The shortcut key for hiding columns within Ctrl + 8 Displays or hides the outline
the sheet in MS-Excel 2010 is - Ctrl + 0 (zero)

90. The function that is used to count the


number of cells in Excel or an array of
numbers is - COUNT function

91. In MS-Excel 2019, the function that adds


up the values in a range is - SUM

92. In MS Excel, the intersection point of a


row and a column within a worksheet is called
- cell

93. The shortcut key used to make the


contents of a cell underlined in MS-Excel is -
Ctrl + 4
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

Topic : Microsoft Word 11. In MS Word 365, shortcut key used to go


to the beginning of the document is - Ctrl +
1. An example of a table style in Microsoft
Home
Word 365 is - Plain Grid
12. Feature in MS Word 365 which allows us
2. In Microsoft Word, which feature allows us
to create a numbered list with different levels
to quickly change the capitalization of
of indentation is - Multilevel numbering
selected text - Toggle case
13. In MS Word 365, the autocorrect feature
3. Icon commonly used to undo the last action
is used for - misspelled text
performed in MS Word 365 is - A curved
arrow pointing to the left 14. In MS Word 365, the ‘B’ icon usually
represents - Bold Formatting
4. Shortcut used to apply bullets in MS Word
365 is - Ctrl + Shift + L 15. Shortcut key used to convert the selected
font in subscript in MS Word is - Ctrl + =
5. Default font style and size in MS Word 365
on Windows 10: - Calibri, 11 16. The thesaurus tool in MS Word 365 is used
for checking for - synonyms and antonyms
6. Option which allows us to create a table in
MS Word 365 - Table insertion 17. In MS Word 365, shortcut key which
capitalizes each word in a text document -
7. The correct software used for Word
Shift + F3
Processing is - MS Word
18. The shortcut key for closing the document
8. Shortcut key used to open the font
in MS Word 365 - Ctrl + W
dialogue box in MS Word is - Ctrl + Shift + F
19. The general functionality of Mail Merge -
9. The default page orientation in MS Word
to create and send bulk emails
365 is - Portrait
20. Option used to paste copied text at a
10. Feature used to save text temporarily
specific location in MS Word 365 - Paste
when it is copied or cut in MS Word 365 -
Special
Clipboard
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

21. In MS Word 365, paragraph formatting 29. In MS Word 365, we apply different page
primarily controls - Line spacing and formatting within the same document by
alignment separating areas with different formats - By
section breaks
22. Button in the Home tab of Microsoft Word
365 can be used to cut selected text - Scissor 30. The correct shortcut key used to increase
Icon paragraph indention in MS Word 365 - Ctrl +
M
23. In MS Word 365, in which layout mode
can we see how text and graphics will appear 31. Options which allow us to set text within a
on the printed page - Print Layout paragraph at different margins in MS Word
365 is - Indenting
24. 'Contact Us' is present in which of the
following sections in MS Word 365 - Help 32. The correct option to convert text into
superscript - Ctrl + Shift + +
25. Feature used to select an entire line or
paragraph from the cursor place in MS Word 33. The binary file format used by older
365 is - Triple Mouse Click versions of Microsoft Word, including MS
Word 97 to 2003, is the - .doc format
26. Shortcut key which is used to switch to
print preview in MS Word 2016 is - Ctrl + Alt + 34. The shortcut key to delete one word to
I the right side in MS Word 2010 - Ctrl + Delete

27. In MS Word 365, hamburger menu means 35. The shortcut key to delete one character
- It hides the traditional file menu to the left side in MS Word 2010 - Backspace

28. Keyboard shortcut used to increase the 36. The shortcut keys to apply double spacing
size of selected text in MS Word 365 is - Ctrl + to the paragraph in MS Word 2010 - Ctrl + 2
]
37. The shortcut key to align the paragraph to
the right in MS Word 2010 - Ctrl + R
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

38. The shortcut keys equivalent to Ctrl + S to 47. The keyboard shortcut for moving the
save an open file in MS Word 2010 - Shift + cursor up one paragraph in MS Word 2010 -
F12 Ctrl + Up arrow key

39. The shortcut key for opening a 48. The command for opening the file page to
new document in MS Word 2010 - Ctrl use backstage view in MS Word 2010 - Alt + F
+N
49. The function key which is used to open the
40. The shortcut key for deleting a character save as dialog box - F12
to the right side in MS Word - Delete
50. The keyboard shortcut to remove
41. The keyboard shortcuts used to center paragraph formatting in MS Word 2010 - Ctrl
align the selected text in MS Word 2010 - Ctrl +Q
+E
51. The shortcut key used to align the text to
42. The keyboard shortcut used to cut the the left in MS Word 2010 is - Ctrl + L
selected items to the clipboard is - Ctrl +
X 52. The title bar in MS Word 2010 displays the
- Application and document names
43. The shortcut key in MS Word 2010 used
to change the paragraph spacing to 1.5-line 53. The keyboard shortcut to close the MS
spacing is - Ctrl + 5 Word 2010 document - Ctrl + W

44. The shortcut key for inserting a hyperlink 54. The keyboard shortcut key to move to the
in an MS Word 2010 document - Ctrl + K previous cell in a row of the table in MS Word
2010 - Shift + Tab
45. The shortcut key to increase font size to
the next larger point size available in the Font 55. The keyboard shortcut to select all
Size list box of MS Word 2010 is - Ctrl + Shift + content of a document in MS Word is - Ctrl +
> A

46. The shortcut key for applying superscript 56. The keyboard shortcut for selecting a
formatting in MS Word 2010 - Ctrl + Shift + + sentence or word in a paragraph in MS Word -
Ctrl + click on statement or word
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

57. The keyboard shortcuts for selecting a 66. The keyboard shortcut for printing a
paragraph in MS Word - Triple-click on paragraph in MS Word 2010 is - Ctrl + Shift +
paragraph F12

58. The keyboard shortcut for opening an 67. The minimum zoom percentage available
already existing doc file in MS Word is - Ctrl + in MS Word documents is - 10%
O
68. The maximum zoom percentage in MS
59. The keyboard shortcuts for indenting Word documents is - 500%
paragraphs in a Word document is - Ctrl + M
69. The term given to pre-made images that
60. The keyboard shortcuts equivalent to Ctrl are ready for use is - Clip Art
+ S to save an open file in MS Word - Shift +
F12 70. In MS Word, the feature used to write
H2O is - Subscript
61. The keyboard shortcut for opening the
Find and Replace (or Replace) dialog box in 71. Center, Left, Justify and Right are valid
Microsoft Word - Ctrl + H categories of alignment in Microsoft Word

62. The keyboard shortcut for going to the 72. An additional margin added to a page
end of an MS Word document is - Alt + End layout to compensate for the part of the
paper made unusable by the binding process
63. The keyboard shortcut for making selected is called - Gutter margin
text superscript in MS Word - Ctrl + Shift +
Plus sign(+) 73. The key used to create a new paragraph in
MS Word is - Enter key
64. The keyboard shortcut for opening the
‘Paste Special’ dialog box in MS Word 2010 - 74. Shortcut key which is used to perform the
Ctrl + Alt + V Redo operation in MS Word - Ctrl + Y

65. Pressing the Tab key within a table in MS 75. Shortcut key used to perform the Undo
Word, the cursor moves to the - Next column operation in MS Word is - Ctrl + Z
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

76. Shortcut key that is used to underline 86. Shortcut to insert a hyperlink for the
text in MS Word - Ctrl + U selected text in Microsoft Word is - Ctrl + K

77. Shortcut key that is used to change text 87. Bold, Italics, Underline, Superscript,
to uppercase in MS Word - Shift + F3 Subscript are the font effects in - MS Word

78. Shortcut key that is used to select all 88. Shortcut used to close a MS Word 365
text in the file in MS Word - Ctrl + A document - Alt + F4

79. The shortcut key to open the 'Paste 89. In MS Word 365, the shortcut used to
Special' dialogue box in MS Word - Alt + Ctrl + center align the selected text - Ctrl + E
V
90. The Quick Access Toolbar has Save, Undo,
80. Shortcut key to remove paragraph and Redo buttons by default in - MS Word
formatting in Microsoft Word 2016 - Ctrl + Q 2010

81. A feature that automatically corrects 91. Microsoft Word - Word 1.0 launched in -
commonly misspelled words - Autocorrect 1983

82. A symbol that is used in writing to 92. What determines the appearance and
introduce an item in a list is - bullet point orientation of the edges of the paragraph -
Alignment
83. Feature which refers to whether letters
are capitalized or not - Case
Alignment Types : Left-aligned, Right -
aligned, Centered, or Justified text
Types of Case: Sentence Case, Lower
Case, Upper Case, Capitalize each word, 93. A smaller symbol, number, or indicator
positioned slightly below the regular line of
84. Shortcut key to open a new file in text is called a - subscript
MS Word 365 - Ctrl + N
94. The access point for programs displayed
85. Changing the color behind the
on the desktop, even if the program is
selected text in MS Word 365 - Shading
minimized - Taskbar
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

95. A document type that creates a copy 105. In Microsoft Word, to view how the
of itself when we open it - Template document will appear when printed is a
feature of - Print Preview
96. It indicates a possible grammar or spacing
error - Wavy Green Line 106. Shortcut for Print Preview in MS Word -
Ctrl + F2
97. It indicates a possible spelling error - Wavy
Red Line 107. In the context of MS Word 2010, the
template is selected to create - a new
98. In Office 365, the shortcut key to insert a
document
footnote is - Ctrl + Alt + F
108. Shortcut keys to switch to print preview
99. In Office 365, the shortcut key to insert an
in MS Word 365 - Ctrl + Alt + I
endnote is - Ctrl + Alt + D
109. Shortcut keys used to save a file in MS
100. In MS Word 2010, the Page
Word 365 is - Ctrl + S
Number option is located under the -
Header and Footer menu 110. Shortcut key to move the cursor one
word to the left in MS Word 365 - Ctrl + Left
101. In MS Word 365, the option which allows
arrow key
us to adjust the line spacing between lines of
text in a paragraph - Line Spacing 111. Shortcut used to copy the selected data
in MS Word 365 is - Ctrl + C
102. In MS Word 365, when we select text
and then press the 'Backspace' key the text is 112. .dotx, .doc, .docx are the file formats in -
- deleted to the left of the cursor MS Word 365

103. Shortcut key (Ctrl + Shift + >) in MS Word 113. Shortcut to check spelling and grammar
365 is used to - Increase the font size in the document in MS Word 365 - F7

104. Formatting feature in MS Word 365, 114. Shortcut key used to print a file in MS
used to emphasize text by making it bold, Word 365 - Ctrl + P
italic, or underlined in documents is - Font
Styling
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

115. The distance between the edge of the columns in MS Word 2010 is called a - Table
text in the document and the top, bottom, or
side edges of the page is - Margins

116. A smaller symbol, number, or indicator


positioned slightly above the regular line of
text is - Superscript

117. The keyboard shortcut for going to


the end of a document is - Shift + End

118. The print setting option used to select


specific pages in MS Word 365 is referred to
as - Custom Print

119. A decorative large capital letter used at


the start of a paragraph or section is - Drop
cap

120. A feature that sets a temporary left or


right margin for paragraph text is - Indent

121. Types of indents: first line indent,


hanging indent, right indent, and left indent

122. A feature that provides the user with


synonyms for selected words is -
Thesaurus

123. A text editor or word processor feature


that breaks lines between words to adjust
them within specified margins is - Word Wrap

124. The arrangement of data in rows and


125. A background image that displays
behind the text in the Word document
is - Watermark

126. Draft, Confidential, or Do Not


Copy are examples of - Watermarks

127. In Office 365, the Print option is


located in the - File menu

128. In Office 365, the Page setup


option is located in - Layout Menu

129. In Office 365, the Navigation


option is located in - View Menu

130. The toolbar that provides access


to several text formatting functions
such as font size and color, text
alignment, lists is - formatting toolbar

131. The primary purpose of using Options in Formatting toolbar: font, font
bullets and numbering in document size, bold, italic, underline, text colour,
formatting is to organize information highlight colour, text alignment, and bullet
into - lists or sequences

Topic : Microsoft Powerpoint

1. WAV files and .MID files are the


two kinds of sound effects files that
can be added in - Microsoft
PowerPoint
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

2. The shortcut key used to open the slide 13. Zoom to fit - Ctrl + Alt + O
show settings in PowerPoint is - Alt + S
14. A feature in MS PowerPoint 365 used to
3. A presentation created on software from share presentations with a large number of
Microsoft that allows users to add audio, audiences is - Share option
visual, and audio/visual features to a
presentation is - Slide show 15. Shortcut used to add a new blank slide to
an existing presentation of MS PowerPoint
4. The special effect that occurs when you exit 365 is - Ctrl + M
one slide and move on to the next during a
presentation is - Transition 16. .pptm, .ppt, .pptx are file formats in - MS
PowerPoint 365
5. All aspects of a slide's appearance,
including its background color, font style, and 17. Visual effects that are applied to different
any recurring text or pictures, is controlled items like graphics, title, or bullet points
by instead of the slides is - Animation
- Slide Master
18. Transition which allows us to animate
6. Duplicate the current slide - Ctrl + D smooth movement from one slide to the next
is - Morph Transition
7. Move a selected item forward - Ctrl + Shift
+F 19. To insert a new slide - Ctrl + M

8. Move a selected item backward - Ctrl 20. Expand all group - Alt + Shift + 9
+ Shift + B
21. Bring the object to the front - Ctrl + Shift +
9. Add or remove an item in focus from ]
selection - Ctrl + Enter
22. Send the object to the back - Ctrl + Shift + [
10. To rename a focused item - F2
23. Group selected object - Ctrl + G
11. Ungroup selected group - Ctrl + Shift + G
24. Move the selected slide to the end in the
12. Show or hide Thumbnail Pane - Ctrl + \ thumbnail pane - Ctrl + Shift + ↓
SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

25. Select one word to the left - Shift + Ctrl + 13. SMTP - Simple Mail Transfer Protocol

14. SEO - Search Engine Optimization
26. Start from current slide - Ctrl + Shift + F5
15. ISP - Internet Service Provider
27. Move the selected slide to the
beginning in the thumbnail pane - Ctrl + 16. WIMAX - Worldwide Interoperability for
Shift + ↑ Microwave Access

Topic : Abbreviations 17. LIDAR - Light Detection and Ranging

1. HLL - High Level Language 18. JPEG - Joint Photographic Experts Group

2. ATM - Automated Teller Machine 19. ODBC - Open Database Connectivity

3. XHTML - Extensible Hypertext Markup 20. DHCP - Dynamic Host Configuration


Language Protocol

4. SGML - Standard Generalized Markup 21. MPEG - Moving Picture Experts Group
Language
22. SMPS - Switched-Mode Power Supply
5. DNS - Domain Name System
23. The full form of PDF in the context of file
6. PDF - Portable Document Format formats - Portable Document Format

7. HLL - High Level Language 24. EVM - Electronic Voting Machine

8. BCC - Blind Carbon Copy 25. ATM - Automatic Teller Machine

9. WORM - Write Once Read Many 26. Large files are compressed into small files
by - WinZip (Windows Zip)
10. HTTP - Hypertext Transfer Protocol
27. In Information Technology, DASD stands
11. TCP - Transfer Control Protocol for - Direct Access Storage Device

12. VoIP - Voice over Internet Protocol


SSC CGL 2024 / SSC MTS 2024 Day 32 : Free 90 Days Revision Series
Topic : MS Word , Powerpoint , Abbreviations

28. COBOL - Common Business-


Note: URL is a unique identifier used to
Oriented Language
locate a resource on the Internet.
29. BIOS - Basic Input/Output System 42. ISP - Internet Service Provider
30. The full form of DPI with regard to digital 43. LIFO - Last-In-First-Out
images - Dots Per Inch
44. FORTRAN - Formula Translation
31. GPRS - General Packet Radio Services
45. W3C - World Wide Web Consortium
32. CDMA - Code Division Multiple Access
46. ASCII - American Standard Code for
33. SEO - Search Engine Optimization Information Interchange
34. ENIAC, the first electronic digital 47. NetBIOS - Network Basic Input/Output
programmable computer device (1943), System
stands for - Electronic Numerical Integrator
and Computer 48. EBCDIC - Extended Binary Coded Decimal
Interchange Code
35. ISCII - Indian Standard Code for
Information Interchange 49. VRML - Virtual Reality Markup Language

36. RDRAM - Rambus Dynamic 50. ENIAC - Electronic Numerical Integrator


Random Access Memory and Computer

37. WORM - Write Once, Read Many 51. BASIC - Beginner’s All-purpose Symbolic
Instruction Code
38. IDN - Internationalized Domain Name

39. GUI - Graphical User Interface

40. Executive Support System (ESS) is a


computer-based system that allows users

41. URL - Uniform Resource Locator


SSC CGL 2024 / SSC MTS 2024 Day 33 : Free 90 Days Revision Series
Topic : Computer Networks , Inventions etc

Topic : Computer Networks time - Half duplex

1. A two-way pathway carrying the actual data


(information) to and from the main memory is
called - Data bus

2. The bus which holds the control and timing


signals needed to coordinate all of the
computer’s activities is - Control bus

3. The central server in a computer network


which lets the concerned user utilize the
storage capacity of the server is - File server

4. The essential hardware enabling


communication between computers in a
network is - Network Interface Card
(NIC)

5. A transmission media used for transmitting


a signal is - Cable

6. A device that connects two or more packet-


switched networks or subnetworks is - Router

7. An electronic device that receives a weak


signal and regenerates it is - Repeater

8. A type of unidirectional communication in


which communication happens in only one
direction - Simplex Mode

9. A type of two-way directional


communication but restricted to only one at a
10. A two-way directional
communication simultaneously that
is both ways of communication
happens at the same time - Full
duplex

11. The network topology in which


connected components make a closed
loop - Ring topology

12. The Internet is called - A super-


network or meta-network

13. A network termed as long haul


network - WAN (Wide Area Network)

14. A shared network within an


organization that enables all its
employees to communicate with one
another is called - Intranet

15. The most common way of


connecting computers to a
network with a wired connection
- Ethernet

16. A network node used in


telecommunications that
connects two networks with
different transmission
protocols together is - Gateway

17. A device used to connect two


separate networks, only forward
packets between networks that
are destined for the other network
- Bridge
SSC CGL 2024 / SSC MTS 2024 Day 33 : Free 90 Days Revision Series
Topic : Computer Networks , Inventions etc

18. The technique of temporarily delaying 27. In computing and digital technology, an
outgoing acknowledgments so that they can electronic pathway through which data can be
be hooked on the next outgoing data frame transferred is called - A bus
is
- Piggybacking 28. A one-way pathway that allows
information to pass in one direction only,
19. A networking device that operates at carries information about where data is
Layer 2 of the OSI model and forwards data stored in memory is called - Address bus
based on MAC addresses is - Switch
29. The protocol used to transfer files from
20. Lines required for connecting N nodes to one host to another over a TCP-based
the host node in a star network are - (N-1) network is - FTP (File Transfer Protocol)
lines
30. A network protocol that allows a user to
21. Lines required for connecting 6 nodes in a remotely access and control another
connected network is - 15 computer over a network is - Telnet

22. LTE technology is used in - 4G 31. A networking protocol that allows two
computers to communicate with each other
23. Rules that exist at several levels in a
over a network - TCP/IP
telecommunication connection - Protocol
32. Copper conductor is the component of
24. Server which works as an intermediary
coaxial cables used in the - Computer
between databases, which store application
networking
data, and web clients - Application Server
33. The transmission medium that primarily
25. Computer software and underlying
consists of a light source, transmission
hardware that accepts requests via HTTP is -
medium, and detector existing together is the
Web server
- Fiber-optic cable
26. The data transfer capacity of a network in
34. The type of wired media used in
bits per second (Bps) is called - Bandwidth
computers that has a cladding component -
Optical fiber cables
SSC CGL 2024 / SSC MTS 2024 Day 33 : Free 90 Days Revision Series
Topic : Computer Networks , Inventions etc

Topic : Inventions and 11. Hypertext was invented by - Ted Nelson


Discoveries
12. Design of barcode developed by - George
1. The first computer mouse is invented by -
Laurer
Douglas Engelbart
13. Video Graphics Array (VGA) was
2. The Integrated Circuit was invented by - J.
developed by - IBM
S. Kilby
14. The first domain name ever registered on
3. Arithometer was invented by - Charles the World Wide Web - www.symbolics.com
Xavier Thomas
15. Founders of Apple Computers - Steve Jobs,
4. He is considered as a precursor to binary Steve Wozniak, Ronald Wayne
logic and arithmetic in computer
programming - Claude Shannon 16. The C++ programming language was
developed at AT&T Bell Laboratories in the
5. The ‘Father of Information Theory’ - Claude early 1980s by - Bjarne Stroustrup
Shannon
17. Founders of Google - Larry Page and
6. An Electronic Discrete Variable Automatic Sergey Brin
Computer (EDVAC) with memory to hold both
stored programs and data was created by - 18. “C”, a programming language was
John Von Neumann developed by - Dennis Ritchie

7. Swift Programming language was 19. The first mechanical computer “Analytical
developed by - Apple Engine” was designed by - Charles Babbage

8. Javascript programming language was 20. HTML (Hypertext Markup Language) was
invented by - Brendan Eich invented in 1990 by - Tim Berners-Lee

9. C programming language was developed by 21. Gmail, YouTube, and Blogger are products
- Dennis Ritchie of - Google

10. COBOL was invented by - Grace Hopper 22. iTunes is a product of - Apple Inc
SSC CGL 2024 / SSC MTS 2024 Day 33 : Free 90 Days Revision Series
Topic : Computer Networks , Inventions etc

23. The Father of Modern Computers - Alan 33. Java was developed by - James Gosling
Turing
34. World Wide Web in 1990 was invented by
24. ‘PARAM 10000’ is a supercomputer of - Sir Tim Berners-Lee
Indian origin, developed by - C-DAC (Centre
for Development of Advanced Computing), 35. YouTube was founded by - Chad Hurley
Pune and Steve Chen

25. Father of Indian Supercomputers - 36. Microsoft’s Windows operating system


Vijay Bhatkar was introduced in - 1985

26. Binary logic and arithmetic in computer 37. The first barcode system was developed
programming were pioneered by - Claude by - Norman Joseph Woodland
Shannon
38. FORTRAN was created by - John Backus
27. The term ‘byte’ was coined by - Werner
39. In India, the first analog computer was
Buchholz
designed by - Samarendra Kumar Mitra
28. The ‘first’ small computer for home use
40. Automatically Programmable Tool (APT) is
was designed by - John Blankenbaker
developed by - Douglas T. Ross
29. Microsoft was founded in 1975 by - Bill
41. LISP, the Programming Language for
Gates and Paul Allen
Artificial Intelligence was created by - John
30. The computer mouse was invented by - McCarthy
Douglas Engelbart
42. Microsoft Corporation was established in -
31. The ‘Pen Drive’ was invented by IBM in - 1975
1998
43. University which designed and built the
32. The Microsoft Corporation was founded in first electronic computer was - University of
1975 at - Albuquerque, New Mexico, United Pennsylvania
States
44. Bluetooth is invented by - Jaap Haartsen
SSC CGL 2024 / SSC MTS 2024 Day 33 : Free 90 Days Revision Series
Topic : Computer Networks , Inventions etc

45. The word “Artificial Intelligence” was 9. A digital circuit that performs addition of
coined by - John McCarthy numbers is called - An adder

46. Father of the World Wide Web (www) - 10. Binary is a number system where numbers
Tim Berners-Lee and values are expressed in - 0 or 1

47. Video Graphics Array (VGA) is a system -


for displaying color graphics

Topic : Number System

1. The base of the Octal Numeral System is - 8

2. In the context of digital computers, pairs of


digits known as the binary code are - 0 & 1

3. In computer coding, powers of two are


used in - Binary Number System

4. The base of the hexadecimal


number system is - 16

5. The base of the decimal number system is -


10

6. Data is stored in a computer in -


Binary form

7. The language used by computers to


process data is - Binary

8. The number of distinct symbols used in the


hexadecimal number system - 16
Number System
System Base Digits
Binary 2 0,1
Octal 8 0, 1, 2, 3, 4,
5, 6 ,7
Decimal 10 0, 1, 2, 3, 4,
5, 6, 7, 8, 9
Hexadecimal 16 0, 1, 2, 3, 4,
5, 6, 7, 8, 9,
A, B, C, D ,E,
F
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

Topic : Computer Threats 10. Software programs or hardware devices


that track the activities (keys pressed) of a
1. Trojan Horse is a form of virus attack.
keyboard are called keyloggers.
2. A program loaded onto a computer and
11. CryptoLocker is a form of ransomware.
running without the user's knowledge is a
type of malware, called a virus. 12. A cyber attack where deceptive emails or
messages are used to trick individuals into
3. A computer virus which damages the
revealing sensitive information is phishing.
formatting of a document and does not allow
it to edit is a macro virus. 13. A computer connected to a network that
has been compromised by a cyber-criminal, a
4. An attempt to obtain sensitive information
Trojan, or a worm is a zombie.
of a person for malicious reasons is termed
phishing. 14. A specific type of virus written in macro, a
programming language for automating
5. A form of ransomware that restricts access
repeated tasks, is a macro virus.
to infected computers by encrypting its
contents is CryptoLocker. 15. A type of virus that ties its own execution
to the execution of various software programs
6. A type of malware designed to give hackers
is a cluster virus.
access to and control over a target device is a
rootkit. 16. In network security, malicious software
disguised as legitimate software to gain
7. A type of malware that hides and stores
unauthorized access is a Trojan.
itself within the computer's memory is called
a resident virus. 17. "SOVA Virus" is a malware.
8. A malware that can adapt, or “morph,” to 18. Hackers with malicious intentions who
avoid detection and circumvent security tools gain unauthorized access to computer
is a polymorphic virus. networks and systems are called black hat
hackers.
9. A type of malware that displays
advertisements on our computer is adware.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

Topic : Computer Security 11. IPS stands for Intrusion Prevention


System.
1. Webroot, Kaspersky, Avira, Avast, Sophos,
and Norton are antivirus software. 12. The standard security technology for
establishing an encrypted link between a web
2. A series of computers and associated
server and a browser is Secure Sockets Layer
peripherals (routers, printers, scanners) that
(SSL).
are all connected as one entity is a domain.
13. ISOC stands for Information Security
3. BYOD stands for Bring Your Own Device.
Operations Center.
4. CAPTCHA stands for Completely
14. SIEM stands for Security Information and
Automated Public Turing test to tell
Event Management.
Computers and Humans Apart.
15. The process of identifying a user’s identity,
5. A broad term that refers to the
making sure that they can have access to the
maintenance and assurance of data quality is
system and/or files is authentication.
data integrity.
16. A network of computers that have been
6. DLP stands for Data Loss Prevention.
infected with a virus and are now working
7. The process of decoding cipher text to plain continuously to create security breaches is
text so that it is readable by humans is called botnets.
decryption.
17. Any security incident that results in
8. The process of storing, analyzing, retrieving, unauthorized access to confidential
and preserving electronic data that may be information is a data breach.
useful in an investigation is digital forensic.
18. ATP stands for Advanced Threat
9. EDR stands for Endpoint Detection and Protection.
Response.
19. APT stands for Advanced Persistent
10. FIDO stands for Fast Identity Online. Threat.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

20. An item that is temporarily blocked (or 6. The internet domain '.mil' is used for the
temporarily allowed) until an additional step military.
is performed is called a greylist.
7. The internet domain '.net' is used for
21. IAM stands for Identity and Access network organizations.
Management.
8. The internet domain '.com’ is used for
22. IoT stands for Internet of Things. commercial organizations.

23. A barrier between two networks 9. The W3C (World Wide Web Consortium) is
identifying and blocking cyber threats while an international organization that creates
allowing appropriate traffic through is called – standards for the World Wide Web.
Firewall
10. The idea of ARPANET (Advanced Research
Topic : Internet Project Agency Network) was conceptualized
in 1961.
1. A type of network that allows users
from outside to access the intranet of an 11. The keyboard shortcut to open the
organization is an extranet. Download window in the Chrome browser is
Ctrl + J.
2. By default, the number of emails in Gmail
that a user can sort that were recently 12. The keyboard shortcuts that can be used
received is 50. to show or hide the bookmarks bar in Google
Chrome are Ctrl + Shift + B.
3. The internet domain ‘.edu’ is used for
educational institutions. 13. The keyboard shortcut to switch to the
last tab of the Chrome browser is Ctrl + 9.
4. The internet domain '.gov' is used for
government institutions. 14. The keyboard shortcuts to open a new
window in incognito (private) mode in the
5. The internet domain '.org' is used for non-
Chrome browser are Ctrl + Shift + N.
profit organizations.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

15. The shortcut key to reset the zoom 24. In a web address, the domain indicator
feature within the Chrome browser to its (suffix) ‘.com‘ stands for commercial.
default setting is Ctrl + 0 (zero).
25. The internet protocol that allows us to
16. A group of interconnected computers access data over the World Wide Web is HTTP
around the world is commonly referred to as (Hypertext Transfer Protocol).
the internet.
26. The standard internet protocol used for
17. The internet is a type of WAN (Wide Area transmitting files from one computer to
Network). another computer connected to the internet
is FTP (File Transfer Protocol).
18. LDAP stands for Lightweight Directory
Access Protocol. 27. An IPv4 address is a string of numbers
consisting of four parts, where each part is a
19. MIME stands for Multipurpose Internet
number between 0 and 255.
Mail Extensions.
28. A unique identifying number assigned to
20. Sending data or a file from our
every device connected to the internet is
computer on the internet is called
called an IP address.
uploading.
29. In internet technology, DNS stands for
21. The transmission of a file or data from one
Domain Name System.
computer to another over a network, usually
from a larger server to a user device, is called 30. The letter 's' in the HTTPS protocol
downloading. denotes secure.

22. The technology that provides high internet 31. The internet works by using a protocol
speed over telephone wiring is called ADSL called TCP/IP.
(Asymmetric Digital Subscriber Line).
32. TCP/IP stands for Transmission Control
23. A key segment of fiber-based networks, Protocol / Internet Protocol.
connecting the central office and terminal
user, is called an Optical Distribution Network.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

33. The technology that provides high internet 43. Twitter, Instagram, LinkedIn, Snapchat,
speed over telephone wiring is called ADSL and Google Meet are some examples of social
(Asymmetric Digital Subscriber Line). networking sites.

34. The server that converts IP addresses to 44. Netscape is an example of a GUI-based
domain names is called DNS. user interface in email.

35. The internet was started in India on 15th 45. An organization that connects computers
August 1995. to the World Wide Web is called an Internet
Service Provider (ISP).
36. The device that enables a computer to
transmit data over telephone and cable lines 46. Email service provider's domain, '@'
is called a modem. symbol, and username are parts of an email
address.
37. A computer on the internet is identified by
its IP address. 47. An electronic device that receives and
retransmits weak signals is called a repeater.
38. Mozilla Firefox, Safari, Opera, Google
Chrome, Slimjet Browser, Maxthon, and UC 48. The first web browser was developed by
Browser are types of web browsers. the National Centre for Supercomputing
Applications (NCSA) and is called Mosaic.
39. A small text file created by a website
that is stored on the user’s computer 49. Outlook, Yandex, and Gmail are email
temporarily for that session is called cookies. service providers.

40. The process of conversion of digital signals 50. The shortcut to reload the current page in
to analog signals is called modulation. the Google search engine is F5.

41. The process of extracting 51. Cookies that are generated and placed on
information/data from the transmitted signal the user's device by a different website other
is called demodulation. than the one the user is visiting are called
third-party cookies.
42. Google Chrome, Opera, and Apple
Safari are some examples of web browsers.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

52. The process of generating HTML markup 61. The field that indicates the sender's
to display web pages in the browser is called address (who sent the email) is called From.
rendering.
62. The field in an email that indicates the
53. The specific address associated with each purpose of that email is called Subject.
web page displayed on the internet is referred
to as a URL (Uniform Resource Locator). 63. The field of an email that indicates the
receiver of that email is called To.
54. An IPv4 address is 32 bits.
64. Outlook, Gmail, and Yahoo are examples
55. The commonly used notation to represent of webmail providers.
an IP address in an understandable format is
called Dotted Decimal Notation. 65. The function that allows the user to send
files along with an email is called attachment.
56. The size of Internet Protocol version 6
(IPv6) address is 128 bits. 66. Unsolicited and unwanted junk email sent
out in bulk to an indiscriminate recipient list is
57. The system on the internet that is used to stored in the spam folder.
convert a URL into an IP address is called the
Domain Name System (DNS). 67. The block of text inserted automatically at
the end of an email message is called an email
58. The intercompany communication of signature.
business documents in a standard is known as
Electronic Data Interchange (EDI). 68. A folder in an email application that
accepts incoming messages is called the
59. Online conversations in which we are inbox.
immediately able to send messages back and
forth to one another are referred to as chat. 69. The deleted mails can be found in the
trash folder.
60. A service that allows us to send
messages in electronic mode over the 70. The first part of the email address is called
internet with a unique address is called the username.
electronic mail (e- mail).
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

71. Bing is a web search engine owned and 81. Application Layer, Transport Layer,
operated by Microsoft. Network Layer, Network Interface Layer, and
Hardware are layers of the Internet Protocol
72. Google is a web search engine owned and
Suite (TCP/IP).
operated by Alphabet Inc.
82. The foundation of data communication on
73. The shortcut used to bookmark the
the web, enabling the transfer of web page
current webpage on the web browser is Ctrl +
content, is Hypertext Transfer Protocol
D.
(HTTP).
74. Web browsers work as part of a
83. The icon used for attaching a file or
client/server model.
document to an email message is the paper
75. The set of protocols that defines all clip icon.
transmission exchanges across the internet is
84. The main purpose of a search engine is
called TCP/IP.
finding information on the internet.
76. Edge is created and developed
85. The storage in an email account for
by Microsoft.
unwanted emails or for emails not succeeding
77. The slowest type of internet connection is to reach the inbox is called the spam folder.
dial-up.
86. The protocol commonly used for sending
78. A modem is used to receive and and receiving emails between servers is called
send computer files over telephone Simple Mail Transfer Protocol (SMTP).
lines.
87. VOIP stands for Voice Over Internet
79. An IP address contains 32 bits. Protocol.

80. In domain names, the expression "au" 88. If an email is sent to more than one
means Australia. person, the email addresses are separated by
a comma symbol.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

89. The method used in unguided 99. The first web browser developed by the
transmission media is infrared. National Centre for Supercomputing
Applications was Mosaic.
90. The cable used as a transmission line for
radio frequency signals is coaxial cable. 100. A graphical web browser based on the
WebKit browser engine is Safari.
91. The organization that oversees the
development and standardization of 101. Spam is an unsolicited email.
technologies for the World Wide Web is W3C.
102. Hotmail was launched in 1996.
92. The ability to communicate with another
person by means other than the physical 103. In the email address [email protected],
senses is called telepathy. India is the username.

93. An email client offered by Microsoft is 104. Junk emails are also known as spam.
Outlook.
105. MTA - Message Transfer Agent
94. A network protocol that is used to
Topic : Programming Languages
configure network devices to communicate on
an IP network is called Dynamic Host 1. A markup language used in creating web
Configuration Protocol (DHCP). pages and web-based applications is HTML
(Hypertext Markup Language).
95. Peer-to-peer (P2P) architecture is a
distributed system in which each node acts as 2. To insert a line break, the HTML tag used is
both a client and a server. <br>.

96. Any message you are writing until you 3. The HTML tag used to make text bold is
send it or trash it is called draft mail. <b>.

97. The first social media site was SixDegrees. 4. The character which informs the browser to
stop tagging the text is </>.
98. The main page of a website or a browser is
called the home page.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

5. A series of instructions written by a 18. A system program that translates and


programmer according to a given set of rules executes an instruction at the same time is
or conventions is called syntax. called an assembler.

6. Java was developed by Sun Company. 19. The official name of JavaScript is
ECMAScript.
7. A server-side scripting language is
PHP (Hypertext Preprocessor). 20. Java, Python, C, Ruby, JavaScript, C#, PHP,
and C++ are examples of computer
8. PHP was originally created in 1993 by
programming languages.
Rasmus Lerdorf.
21. Python, Visual Basic, Delphi, Perl, PHP,
9. A memory recovery feature built into
ECMAScript, Ruby, C#, and Java are types of
programming languages such as C# and Java is
high-level programming languages.
called garbage collection (GC).
22. In computers, LOGO and Scratch are
10. JSP stands for Java Server Pages.
programming languages.
11. LISP stands for List Processing.
23. AJAX stands for Asynchronous JavaScript
12. Oracle stands for Oak Ridge Automatic and XML.
Computer and Logical Engine.
24. AML stands for Algebraic Modeling
13. OPML stands for Outline Processor Languages.
Markup Language.
25. ASP stands for Application Service
14. PERL stands for Practical Extraction and Provider.
Reporting Language.
26. BOPL stands for Basic Object Programming
15. PHP stands for Hypertext Preprocessor. Language.

16. Python is a programming language. 27. BCPL stands for Basic Combined
Programming Language.
17. The programming language Java was
developed by James Gosling.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

28. BASIC stands for Beginners All-purpose 39. A language for the specification of
Symbolic Instruction Code. procedures for the retrieval of information
from a database is called a Query Language.
29. COBOL stands for Common Business
Oriented Language. 40. A language used to control the tasks of the
computer itself, such as starting other
30. CSS stands for Cascading Style Sheets.
programs, is called a Command Language.
31. HDMI stands for Handheld Device
41. A formal language used to express
Markup Language.
information or knowledge, often for use in
32. IDL stands for Interface Definition computer system design, is called a Modeling
Language. Language.

33. A database programming language 42. A computer language used to create and
designed to manage data from a database is modify the structure of database objects in a
SQL (Structured Query Language). database is called a Data Definition Language
(DDL).
34. A computer programming language used
for adding (inserting), deleting, and modifying Topic : Miscellaneous
(updating) data in a database is called Data
1. 210 mm x 297 mm is the measurement of
Manipulation Language (DML).
A4 size paper.
35. The first operating system written in C
2. The first Indian newspaper that became
language is UNIX.
available on the Internet was The Hindu.
36. The first high-level computer
3. A device that detects and responds to some
programming language is FORTRAN.
type of input from the physical environment is
37. JavaScript came into existence in 1995. called a sensor.

38. A computer language that expresses the 4. An electronic card/board that is used to add
presentation of structured documents, such extra functionality to a computer is an
as CSS, is called a Style Sheet language. expansion card.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

5. CREATE, ALTER, DROP, and TRUNCATE are 13. Data Manipulation Language (DML) is a
examples of commands that come under DDL query language for accessing and
(Data Definition Language). manipulating data in a database management
system.
6. The command that is used to create
databases, tables, triggers, and other 14. Natural Language Processing (NLP) refers
database objects is CREATE. to the branch of artificial intelligence.

7. The command that is used to delete 15. An ordered list in which all insertions and
objects from the database is DROP. deletions are made at one end is called a
stack.
8. The command that is used to alter the
structure of the database is ALTER. 16. A step-by-step procedure or a defined set
of rules to be followed to solve a particular
9. The command that is used to remove all
problem is called an algorithm.
records from a table, including space
allocated for storing the table records, is 17. Shift and Alt keys are examples of modifier
TRUNCATE. keys.

10. The command that is used to add 18. A diagrammatic representation of a


comments to the data dictionary is program's logic is called a flowchart.
COMMENT.
19. ENIAC was developed in the USA.
11. The command that is used to rename an
object existing in the database is RENAME. 20. The headquarters of Intel is located in
California.
12. Indexing is a data structure technique
which allows you to quickly retrieve records 21. India’s first Post Office ATM was opened in
from a database file. Chennai.
SSC CGL 2024 / SSC MTS 2024 Day 34 : Free 90 Days Revision Series
Topic : Threats , Security , Internet etc

22. A series of supercomputers designed and 31. Desktop computers, laptop computers,
assembled by the Centre for Development of tablets, and smartphones are types of
Advanced Computing (C-DAC) in Pune, India, microcomputers.
is called PARAM.
32. The illegal production and distribution of
23. Logic gates are mainly of three software application is - Piracy
types: AND, OR, and NOR gate.

24. A type of barcode that stores information


and can be read by a digital device, such as a
cell phone, is a Quick Response (QR) code.

25. A set of contiguous data of similar data


type is called an array.

26. The collection and manipulation of digital


data to produce meaningful information is
known as data processing.

27. Three components of a computer that


impact its performance are RAM, CPU, and
hard disk speed.

28. India's first supercomputer is Param 8000,


developed by Vijay Pandurang Bhatkar in
1991.

29. A method of protecting information and


communications through the use of codes is
called cryptography.

30. Debugging is another term for removing


errors.

You might also like