Home
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Other Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2024
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M1 R5: Information Technology Tools and Network Basics
Set
25
See Explanation !
1
Which of the following shortcut keys will be used to go to the left of the cell in LibreOffice Calc?
LibreOffice Calc में सेल के बाईं ओर जाने के लिए निम्नलिखित में से किस शॉर्टकट कुंजी का उपयोग किया जाएगा?
Tab
Alt
Alt + Tab
Shift + Tab
Next Question
25
See Explanation !
2
Junk E-mail is also called
जंक ई-मेल को ______ भी कहा जाता है।
Spoof
Spam
Copple crumbs
sniffer script
Previous Question
Next Question
25
See Explanation !
3
Which option is used to restrict scrolling of row and column?
पंक्ति और स्तंभ के स्क्रॉलिंग को प्रतिबंधित करने के लिए किस विकल्प का उपयोग किया जाता है?
Pause
Stop
Freeze
Scroll Off
Previous Question
Next Question
25
See Explanation !
4
in Network , WAN stands for
नेटवर्क में, WAN का अर्थ है
Wap Area Network
Wide Area Network
Wide Array Net
Wireless Area Network
Previous Question
Next Question
25
See Explanation !
5
It is a program or hardware device that filters the information coming through an internet connection to a network or computer system.
यह एक प्रोग्राम या हार्डवेयर डिवाइस है जो नेटवर्क या कंप्यूटर सिस्टम में इंटरनेट कनेक्शन के माध्यम से आने वाली जानकारी को फ़िल्टर करता है।
Anti virus
Cookies
Firewall
Cyber safety
Previous Question
Next Question
25
See Explanation !
6
In computer security,…………… means that the information in a computer system only be accessible viewing by authorized parities.
कंप्यूटर सुरक्षा में,……………… का अर्थ है कि कंप्यूटर सिस्टम में जानकारी केवल अधिकृत समता द्वारा देखी जा सकती है।
Availability
Integrity
Confidentiality
All of the above
Previous Question
Next Question
25
See Explanation !
7
India's largest app for financial services thst has integrated with Unified Payment Interface (UPI) is
वित्तीय सेवाओं के लिए भारत का सबसे बड़ा ऐप THST एकीकृत भुगतान इंटरफ़ेस (UPI) के साथ एकीकृत है
Wally
Mint
You Need a Budget
ETMONEY
Previous Question
Next Question
25
See Explanation !
8
What are the three basic component of computer security?
कंप्यूटर सुरक्षा के तीन मूल घटक क्या हैं?
Confidentiality, integrity, availability
Control, intelligence, action
Central, intelligence, agency
Confidence, integrity, action
Previous Question
Next Question
25
See Explanation !
9
What are the common security threats
सामान्य सुरक्षा खतरे क्या हैं
File Shredding
File sharing and permission
File corrupting
File integrity
Previous Question
Next Question
25
See Explanation !
10
which one is not a type of topology?
कौन सा टोपोलॉजी का एक प्रकार नहीं है?
Trees
Ring
Mesh
star
Previous Question
Next Question
25
See Explanation !
11
Which of the following has many features of that is now known as cloud computing?
निम्नलिखित में से किसमें इसकी कई विशेषताएं हैं जिन्हें अब क्लाउड कंप्यूटिंग के रूप में जाना जाता है?
Web Service
Softwares
All of the mentioned
Internet
Previous Question
Next Question
25
See Explanation !
12
Which menu is used to insert a table into a slide?
स्लाइड में टेबल डालने के लिए किस मेनू का इस्तेमाल किया जाता है?
Tools
Format
Insert
Slide
Previous Question
Next Question
25
See Explanation !
13
What is the full form of NEFT?
NEFT का पूर्ण रूप क्या है?
National election fund transfer
National electronic funds transfer
National electric fund transfer
None of these
Previous Question
Next Question
25
See Explanation !
14
What is the full form of RAM ?
RAM का पूर्ण रूप क्या है?
Read Access Memory
Random Access Memory
Red Access Memory
None of the above
Previous Question
Next Question
25
See Explanation !
15
What is the code for USSD?
USSD का कोड क्या है?
*199#
*99#
*121#
*919#
Previous Question
Next Question
25
See Explanation !
16
When an earthquake severs a fiber-optic cable, this is a network _______ issue
जब कोई भूकंप फाइबर - ऑप्टिक केबल को सीवर करता है, तो यह एक नेटवर्क _______ समस्या है
Performance
Reliability
Security
None of the above
Previous Question
Next Question
25
See Explanation !
17
Two of the important browsers are ________ and ________.
दो महत्वपूर्ण ब्राउज़र ________ और ________ हैं।
lynx, minx
netscape, ie
mosaic, gopher
none of the above
Previous Question
Next Question
25
See Explanation !
18
In networking, what does VPN stand for?
नेटवर्किंग में, वीपीएन का क्या अर्थ है?
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Previous Question
Next Question
25
See Explanation !
19
Which of the following documents can be stored in DigiLocker?
निम्नलिखित में से कौन से दस्तावेज़ DigiLocker में संग्रहीत किए जा सकते हैं?
Cooking recipes
School textbooks
Aadhaar card, PAN card, and driving license
Music albums
Previous Question
Next Question
25
See Explanation !
20
Internet explorer falls under :
इंटरनेट एक्सप्लोरर के अंतर्गत आता है:
Operating System
Compiler
Browser
IP address
Previous Question
Next Question
25
See Explanation !
21
What is the term used to refer to sending unwanted bulk messages, especially advertising, indiscriminately?
अवांछित थोक संदेश, विशेष रूप से विज्ञापन, अंधाधुंध भेजने के लिए किस शब्द का उपयोग किया जाता है?
Phising
Spamming
Virus
Malware
Previous Question
Next Question
25
See Explanation !
22
To Replace a word Bombay with Mumbai, we should go to which of the following menus?
बॉम्बे शब्द को मुंबई से बदलने के लिए, हमें निम्नलिखित में से किस मेनू पर जाना चाहिए?
Tools menu
Edit menu
View menu
Language Menu
Previous Question
Next Question
25
See Explanation !
23
FTP Tool is to
FTP टूल है
Used to transfer data/files among computers on the Interne
Used to transfer data/files among computers on the Interne
Copy files from external sources
Copy files from external sources
Previous Question
Next Question
25
See Explanation !
24
We can replace multiple occurrences of a word using which of the following facilities of Calc?
हम Calc की निम्नलिखित सुविधाओं में से किसका उपयोग करके एक शब्द की कई घटनाओं को बदल सकते हैं?
Find and replace
By Copy only
By copy command
By preview command
Previous Question
Next Question
25
See Explanation !
25
_______ is a network reliability issue.
_______ एक नेटवर्क विश्वसनीयता मुद्दा है।
The number of users
The type of transmission medium
The frequency of failure
Unauthorized access
Previous Question