UGC NET JUNE 2013 
SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS. 
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
    
IF YOU KNOW ANSWER OF ANY QUESTIONS PLZ TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLZ REPLY RIGHT ANSWER
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
IF YOU KNOW ANSWER OF ANY QUESTIONS PLZ TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLZ REPLY RIGHT ANSWER
1. The most frequently 
used instructions of a computer program are likely to be fetched 
from:
(A) the hard 
disk
(B) cache 
memory
(C) RAM
(D) 
registers
(E) None of 
these
Ans : (B)
2. The ____________ contains 
data descriptions and defines the name, data type, and length of each field in 
the database.
(A) data 
dictionary
(B) data 
table
(C) data 
record
(D) data 
field
(E) None of 
these
Ans : (A)
3. Personal logs or journal 
entries posted on the Web are known as:
(A) 
listservs
(B) 
Webcasts
(C) blogs
(D) subject 
directories
(E) None of 
these
Ans : (C)
4. A(n) _______ uses pictures 
(called icons) and menus displayed on the screen to send commands to the 
computer system.
(A) command - based 
user interface
(B) GUI
(C) system 
utility
(D) API
(E) None of 
these
Ans : (B)
5. The _____ manual tells you 
how to use a software program.
(A) 
documentation
(B) 
programming
(C) 
technical
(D) user
(E) None of 
these
Ans : (A)
6. Which of the following is 
NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C) 
Dial-up
(D) 
Satellite
(E) None of 
these
Ans : (C)
7. Software, such as viruses, 
worms and Trojan horses, that has a malicious intent, is known as:
(A) 
spyware
(B) 
adware
(C) spam
(D) 
malware
(E) None of 
these
Ans : (D)
8. Making a field ______ 
meAns : that it cannot be left blank.
(A) 
numeric
(B) 
required
(C) 
calculated
(D) 
validated
(E) None of 
these
Ans : (B)
9. _________ is the process 
of finding errors in software code.
(A) 
Debugging
(B) 
Compiling
(C) 
Testing
(D) 
Running
(E) None pf 
these
Ans : (C)
10. ____________ are viruses 
that are triggered by the passage of time or on a certain date.
(A) Boot-sector 
viruses
(B) Macro 
viruses
(C) Time 
bombs
(D) Worms
(E) None of 
these
Ans : (C)
11. Linux is a (n) 
____________ operating system.
(A) 
open-source
(B) 
Microsoft
(C) 
Windows
(D) Mac
(E) None of 
these
Ans : (A)
12. What is a 
backup?
(A) Restoring the 
information backup
(B) An exact copy of 
a system's information
(C) The ability to 
get a system up and running in the event of a system crash or failure
(D) All of 
these
(E) None of 
these
Ans : (D)
13. Which of the following 
places the common data elements in order from smallest to largest
(A) character, file, 
record, field, database
(B) character, 
record, field, database, file
(C) character, 
field, record, file, database
(D) Bit, byte, 
character, record, field, file, database,
(E) None of 
these
Ans : (C)
14. The internet is 
......
(A) a large network 
of networks
(B) an internal 
communication system for a business
(C) a communication 
system for the Indian government
(D) All of 
these
(E) None of 
these
Ans : (D)
15. ____________ are lists of 
commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) 
Windows
(E) None of 
these
Ans : (C)
16. Which of the following 
statements is FALSE concerning file names?
(A) Files may share 
the same name or the same extension but not both
(B) Every file in 
the same folder must have a unique name
(C) File extension 
is another name for file type
(D) The file 
extension comes before the dot (.) followed by the file name
(E) None of 
these
Ans : (D)
17. Verification of a login 
name and password is known as:
(A) 
configuration
(B) 
accessibility
(C) 
authentication
(D) logging 
in
(E) None of 
these
Ans : (C)
18. Which of the following 
would most likely NOT be a symptom of a virus?
(A) Existing program 
files and icons disappear.
(B) The CD-ROM stops 
functioning.
(C) The Web browser 
opens to an unusual home page.
(D) Odd messages or 
images are displayed on the screen.
(E) None of 
these
Ans : (B)
19. Which of the following is 
a web browser ? 
(A) Paint 
(B) Power Point 
(C) Fire fox 
(D) Word 
(E) All are web 
browser 
ANS (C) 
20. Most of the commonly used 
personal computers/laptops do not have a command key known as ____ 
(A) Turnover 
(B) Shift 
(C) Alter 
(D) Delete 
(E) Insert 
ANS (A) 
21. What is the full form of 
USB as used in computer related activities? 
(A) Universal 
Security Block 
(B) Ultra Serial 
Block 
(C) United Service 
Block 
(D) Universal Serial 
Bus 
(E) None of these 
ANS (D) 
22. The Quickest and easiest 
way in Word, to locate a particular word or phrase in a document is use the 
....... command. 
(A) Replace 
(B) Find 
(C) Lookup 
(D) Search 
(E) None of these 
ANS (B) 
23. Which of the following is 
NOT a computer programming language ? 
(A) C 
(B) C++ 
(C) Java 
(D) COBOL 
(E) Microsoft 
ANS (E) 
24. To prepare a presentation 
/slide show which application is commonly used ? 
(A) Photoshop 
(B) Power point 
(C) Outlook express 
(D) Internet 
Explorer 
(E) All of these 
ANS (B) 
25. Which of the following is 
NOT a hardware of a computer ? 
(A) Monitor 
(B) Keyboard 
(C) Windows 
(D) Central 
Processing Unit 
(E) Mouse 
ANS (C)
IF YOU FIND ANY 
ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT 
ANSWER

0 comments:
Post a Comment