UGC NET JUNE 2013
SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
IF YOU KNOW ANSWER OF ANY QUESTIONS PLZ TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLEASE REPLY RIGHT ANSWER
1. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
2. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
3. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
4. The operating system does all of the following EXCEPT:
5. A ____________represent approximately one billion memory locations.
6. ____________cells involves creating a single cell by combining two or more selected cells.
7. The operating system is the most common type of____________software.
8. When you quickly press and releaes the left mouse button twice , you are—
9. The horizontal and vertical lines on a worksheet are called—
10. in a ring topology , the the computer in possession of the ______ can trasmit data
11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
13. ________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the computer
14. Servers are computers that provide resources to other computers connected to a ___________
15. A goal of data mining includes which of the following?
16. URL stands for ........
17. A database management system (DBMS) is a ............
18. Which of the following is NOT a goal of transaction processing system ?
19. A Proxy server is used for which of the following?
20. When data changes in multiple lists and all lists are not updated, this causes:
21. _____________ are words that a programming language has set aside for its own use.
22. What is the primary difference between a virus and a worm?
23. ______ describe what is database fields.
24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
25. A goal of normalization is to __________
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
IF YOU KNOW ANSWER OF ANY QUESTIONS PLZ TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLEASE REPLY RIGHT ANSWER
1. To delete an incorrect character in a document, ____________ to erase to the right of the insertion point.
(A) press the left
mouse key
(B) double-click the
right mouse key
(C) press the
BACKSPACE key
(D) press the delete
key
(E) None of
these
Ans : (D)
2. In Windows XP, if you want to see the file size and modified dates of all files in a folder, the best viewing option is the __________ view.
(A) List
(B)
Thumbnails
(C)
Details
(D) Icon
Ans : (C)
3. Using Windows Explorer, a plus (+) sign in front of a folder indicates—
(A) an open
folder.
(B) the folder
contains subfolders.
(C) a text
file.
(D) a graphics
file.
Ans : (B)
4. The operating system does all of the following EXCEPT:
(A) provide a way
for the user to interact with the computer.
(B) manage the
central processing unit (CPU).
(C) manage memory
and storage.
(D) enable users to
perform a specific task such as document editing.
Ans : (D)
5. A ____________represent approximately one billion memory locations.
(A)
kilobyte
(B)
megabyte
(C)
gigabyte
(D)
terabyte
(E) None of
these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A)
Formatting
(B)
Merging
(C)
Embedding
(D)
Splitting
(E) None of
these
Ans : (B)
7. The operating system is the most common type of____________software.
(A)
communication
(B)
application
(C)
system
(D)
word-processing
(E) None of
these
Ans : (C)
8. When you quickly press and releaes the left mouse button twice , you are—
(A)
Primary-clicking
(B)
pointing
(C)
Double-clicking
(D)
Secondary-clicking
(E) None of
these
Ans : (C)
9. The horizontal and vertical lines on a worksheet are called—
(A) cells
(B)
sheets
(C) block
lines
(D)
gridlines
(E) None of
these
Ans : (D)
10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A)
packet
(B) data
(C) access
method
(D) token
(E) None of
these
Ans : (D)
11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____
(A) basic
input/output system
(B) secondary
input/output system
(C) peripheral
input/output system
(D) marginal
input/output system
(E) None of
these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan
horse
(B) Boot
sector
(C)
Script
(D) Logic
bomb
(E) None of
these
Ans : (B)
13. ________ controls the way in which the computer system functions and provides a meAns : by which users can interact with the computer
(A) The
platform
(B) Application
software
(C) Operating
system
(D) The
motherboard
(E) None of
these
Ans : (C)
14. Servers are computers that provide resources to other computers connected to a ___________
(A)
mainframe
(B)
network
(C)
supercomputer
(D)
client
(E) None of
these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some
observed event or condition
(B) To confirm that
data exists
(C) To analyze data
for expected relationships
(D) To create a new
data warehouse
(E) None of
these
Ans : (A)
16. URL stands for ........
(A) Universal
Research List
(B) Universal
Resource List
(C) Uniform Resource
Locator
(D) Uniform Research
Locator
(E) None of
these
Ans : (C)
17. A database management system (DBMS) is a ............
(A) hardware system
used to create , maintain and provide controlled access to a database
(B) hardware system
used to create, maintain, and provide uncontrolled access to a
database.
(C) software system
used to create, maintain, and provide uncontrolled access to a
database.
(D) software system
used to create, maintain, and provide controlled access to a
database.
(E) None of
these
Ans : (D)
18. Which of the following is NOT a goal of transaction processing system ?
(A) Capture ,
process and store transactions
(B) Produce a
variety of documents related to routine business activities
(C) Reduce manual
effort associated with processing business transactions
(D) Produce standard
reports used for management decision making
(E) None of
these
Ans : ()
19. A Proxy server is used for which of the following?
(A) To provide
security against unauthorized users
(B) To process
client requests for web pages
(C) To process
client requests for database access
(D) To provide
TCP/IP
(E) None of
these
Ans : (B)
20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data
redundancy
(B) information
overload
(C) duplicate
data
(D) data
inconsistency
(E) None of
these
Ans : (D)
21. _____________ are words that a programming language has set aside for its own use.
(A) Control
worlds
(B) Reserved
words
(C) Control
structures
(D) Reserved
keys
(E) None of
these
Ans : (B)
22. What is the primary difference between a virus and a worm?
(A) A worm has the
ability to self-propagate from an infected user's computer to other
computers
(B) A worm is
usually written by a cracker: Script bunnies do not have the skills to develop a
worm program
(C) A virus is very
harmful to the computers it infects : a worm is not a serious a
problem
(D) Anti-virus
software is effective in fighting viruses but not worms
(E) None of
these
Ans : ()
23. ______ describe what is database fields.
(A)
Structures
(B) Field
markers
(C) Field
definition
(D) Field
names
(E) None of
these
Ans : (D)
24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A)
router
(B) modem
(C) node
(D) cable
(E) None of
these
Ans : (A)
25. A goal of normalization is to __________
(A) minimize the
number of relationships
(B) minimize the
number of entities
(C) minimize the
number of tables
(D) minimize the
number of redundancy
(E) None of
these
Ans : (D)
IF YOU FIND ANY
ANSWER WRONG, COMMENT ME,SO THAT I RIGHT THAT
ANSWER
0 comments:
Post a Comment