UGC NET JUNE 2013
SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
IF YOU KNOW ANSWER OF ANY QUESTIONS PLZ TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLZ REPLY RIGHT ANSWER
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.
IF YOU KNOW ANSWER OF ANY QUESTIONS PLZ TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLZ REPLY RIGHT ANSWER
1. The most frequently
used instructions of a computer program are likely to be fetched
from:
(A) the hard
disk
(B) cache
memory
(C) RAM
(D)
registers
(E) None of
these
Ans : (B)
2. The ____________ contains
data descriptions and defines the name, data type, and length of each field in
the database.
(A) data
dictionary
(B) data
table
(C) data
record
(D) data
field
(E) None of
these
Ans : (A)
3. Personal logs or journal
entries posted on the Web are known as:
(A)
listservs
(B)
Webcasts
(C) blogs
(D) subject
directories
(E) None of
these
Ans : (C)
4. A(n) _______ uses pictures
(called icons) and menus displayed on the screen to send commands to the
computer system.
(A) command - based
user interface
(B) GUI
(C) system
utility
(D) API
(E) None of
these
Ans : (B)
5. The _____ manual tells you
how to use a software program.
(A)
documentation
(B)
programming
(C)
technical
(D) user
(E) None of
these
Ans : (A)
6. Which of the following is
NOT a type of broadband Internet connection?
(A) Cable
(B) DSL
(C)
Dial-up
(D)
Satellite
(E) None of
these
Ans : (C)
7. Software, such as viruses,
worms and Trojan horses, that has a malicious intent, is known as:
(A)
spyware
(B)
adware
(C) spam
(D)
malware
(E) None of
these
Ans : (D)
8. Making a field ______
meAns : that it cannot be left blank.
(A)
numeric
(B)
required
(C)
calculated
(D)
validated
(E) None of
these
Ans : (B)
9. _________ is the process
of finding errors in software code.
(A)
Debugging
(B)
Compiling
(C)
Testing
(D)
Running
(E) None pf
these
Ans : (C)
10. ____________ are viruses
that are triggered by the passage of time or on a certain date.
(A) Boot-sector
viruses
(B) Macro
viruses
(C) Time
bombs
(D) Worms
(E) None of
these
Ans : (C)
11. Linux is a (n)
____________ operating system.
(A)
open-source
(B)
Microsoft
(C)
Windows
(D) Mac
(E) None of
these
Ans : (A)
12. What is a
backup?
(A) Restoring the
information backup
(B) An exact copy of
a system's information
(C) The ability to
get a system up and running in the event of a system crash or failure
(D) All of
these
(E) None of
these
Ans : (D)
13. Which of the following
places the common data elements in order from smallest to largest
(A) character, file,
record, field, database
(B) character,
record, field, database, file
(C) character,
field, record, file, database
(D) Bit, byte,
character, record, field, file, database,
(E) None of
these
Ans : (C)
14. The internet is
......
(A) a large network
of networks
(B) an internal
communication system for a business
(C) a communication
system for the Indian government
(D) All of
these
(E) None of
these
Ans : (D)
15. ____________ are lists of
commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D)
Windows
(E) None of
these
Ans : (C)
16. Which of the following
statements is FALSE concerning file names?
(A) Files may share
the same name or the same extension but not both
(B) Every file in
the same folder must have a unique name
(C) File extension
is another name for file type
(D) The file
extension comes before the dot (.) followed by the file name
(E) None of
these
Ans : (D)
17. Verification of a login
name and password is known as:
(A)
configuration
(B)
accessibility
(C)
authentication
(D) logging
in
(E) None of
these
Ans : (C)
18. Which of the following
would most likely NOT be a symptom of a virus?
(A) Existing program
files and icons disappear.
(B) The CD-ROM stops
functioning.
(C) The Web browser
opens to an unusual home page.
(D) Odd messages or
images are displayed on the screen.
(E) None of
these
Ans : (B)
19. Which of the following is
a web browser ?
(A) Paint
(B) Power Point
(C) Fire fox
(D) Word
(E) All are web
browser
ANS (C)
20. Most of the commonly used
personal computers/laptops do not have a command key known as ____
(A) Turnover
(B) Shift
(C) Alter
(D) Delete
(E) Insert
ANS (A)
21. What is the full form of
USB as used in computer related activities?
(A) Universal
Security Block
(B) Ultra Serial
Block
(C) United Service
Block
(D) Universal Serial
Bus
(E) None of these
ANS (D)
22. The Quickest and easiest
way in Word, to locate a particular word or phrase in a document is use the
....... command.
(A) Replace
(B) Find
(C) Lookup
(D) Search
(E) None of these
ANS (B)
23. Which of the following is
NOT a computer programming language ?
(A) C
(B) C++
(C) Java
(D) COBOL
(E) Microsoft
ANS (E)
24. To prepare a presentation
/slide show which application is commonly used ?
(A) Photoshop
(B) Power point
(C) Outlook express
(D) Internet
Explorer
(E) All of these
ANS (B)
25. Which of the following is
NOT a hardware of a computer ?
(A) Monitor
(B) Keyboard
(C) Windows
(D) Central
Processing Unit
(E) Mouse
ANS (C)
IF YOU FIND ANY
ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT
ANSWER
0 comments:
Post a Comment