Home
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Other Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2024
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M1 R5: Information Technology Tools and Network Basics
Set
25
See Explanation !
1
Which of the following cannot be used to back up files?
फ़ाइलों का बैकअप लेने के लिए निम्नलिखित में से किसका उपयोग नहीं किया जा सकता है?
External HDD
USB drive
Optical disc
RAM
Next Question
25
See Explanation !
2
What significant advancement did the UNIVAC I (Universal Automatic Computer) achieve in computing history
कंप्यूटिंग इतिहास में UNIVAC I (यूनिवर्सल ऑटोमैटिक कंप्यूटर) ने क्या महत्वपूर्ण प्रगति हासिल की
First stored-program computer
First commercial computer
First use of vacuum tubes
First computer to support multitasking
Previous Question
Next Question
25
See Explanation !
3
When Was NPCI Started?
NPCI की शुरुआत कब हुई थी?
2004
2006
2008
2010
Previous Question
Next Question
25
See Explanation !
4
What is the recommended number of slides for a presentation?
प्रेज़ेंटेशन के लिए सुझाई गई स्लाइड की संख्या कितनी है?
500
10
30
None of these
Previous Question
Next Question
25
See Explanation !
5
_____ is the fastest technique to instantly transfer funds electronically between different banks.
_____ विभिन्न बैंकों के बीच इलेक्ट्रॉनिक रूप से धनराशि को तुरंत स्थानांतरित करने की सबसे तेज़ तकनीक है।
NEFT
RTGS
SMPS
IMPS
Previous Question
Next Question
25
See Explanation !
6
Which of the following has potentially the largest storage space?
निम्नलिखित में से किसके पास संभावित रूप से सबसे बड़ी भंडारण जगह है?
Primary storage
Cloud-based storage
External HDD
SSD
Previous Question
Next Question
25
See Explanation !
7
IP address stands for
IP एड्रेस का मतलब है
Internet Protocol address
Internet Provider address
Intranet Protocol address
None of the mentioned
Previous Question
Next Question
25
See Explanation !
8
What is the default name of Presentation in LibreOffice Impress?
LibreOffice Impress में प्रस्तुति का डिफ़ॉल्ट नाम क्या है?
Shw1
Slide1
Presentation1
Untitled1
Previous Question
Next Question
25
See Explanation !
9
We should keep our savings in banks because
हमें अपनी बचत बैंकों में रखनी चाहिए क्योंकि
its safe
Get interest
Can be withdraw at any time
All of the above
Previous Question
Next Question
25
See Explanation !
10
www is based on which model?
www किस मॉडल पर आधारित है?
Local-server
Client-server
3-tier
None of these
Previous Question
Next Question
25
See Explanation !
11
Which of the following protocols sends web pages?
निम्नलिखित में से कौन सा प्रोटोकॉल वेब पेज भेजता है?
IMAP
HTTP
VoIP
IMAP
Previous Question
Next Question
25
See Explanation !
12
Name the term that refers to a technique used to gain unauthorized access to a computer system or network and in some cases even making unauthorized use of this access.
उस शब्द का नाम बताएं जो कंप्यूटर सिस्टम या नेटवर्क तक अनधिकृत पहुंच प्राप्त करने के लिए उपयोग की जाने वाली तकनीक को संदर्भित करता है और कुछ मामलों में इस पहुंच का अनधिकृत उपयोग भी करता है।
Virus
Antivirus
Malware
Hacking
Previous Question
Next Question
25
See Explanation !
13
What is the full name of AEPS?
AEPS का पूरा नाम क्या है?
Annual Premium Equivalent System
Aadhar Premium Enabled System
Aadhar Payment Enabled System
Aadhar Enabled Payment System
Previous Question
Next Question
25
See Explanation !
14
Using Microsoft word's Find and Replace feature you can
माइक्रोसॉफ्ट वर्ड के फाइंड एंड रिप्लेस फीचर का उपयोग करके आप कर सकते हैं
Replacing both text and formatting
Replace text only
Replace formatting only
Replace documents name only
Previous Question
Next Question
25
See Explanation !
15
Which of the following is NOT a challenge of big data analysis?
निम्नलिखित में से कौन सा बिग डेटा विश्लेषण की चुनौती नहीं है?
Data security and privacy
Data quality and integrity
Limited storage capacity
Anonymity
Previous Question
Next Question
25
See Explanation !
16
By default how many menus are present in LibreOffice Calc?
डिफ़ॉल्ट रूप से LibreOffice Calc में कितने मेनू मौजूद हैं?
11
12
13
10
Previous Question
Next Question
25
See Explanation !
17
Which of the following is Google’s online storage service?
Google की ऑनलाइन स्टोरेज सेवा निम्नलिखित में से कौन सी है?
Google Drive
Google Docs
ChromeeDrive
ChromeeDrive
Previous Question
Next Question
25
See Explanation !
18
Libre Office Calc shortcut key for automatic spell check?
स्वत: वर्तनी जांच के लिए Libre Office Calc शॉर्टकट कुंजी?
Shift+F7
CTRL+F7
Shift+F9
CTRL+F9
Previous Question
Next Question
25
See Explanation !
19
In LibreOffice writer in which menu are commands like cut copy and paste?
LibreOffice राइटर में कट कॉपी और पेस्ट जैसे कमांड किस मेनू में हैं?
Edit
View
Insert
File
Previous Question
Next Question
25
See Explanation !
20
Malware is used to
मैलवेयर का उपयोग किया जाता है
Disrupt computer operation
Gather sensitive information
Both A and B
All of the Above
Previous Question
Next Question
25
See Explanation !
21
Secret key encryption is also known as
गुप्त कुंजी एन्क्रिप्शन को............ के रूप में भी जाना जाता है
Secret–encryption
Private encryption
Symmetric encryption
Asymmetric encryption
Previous Question
Next Question
25
See Explanation !
22
Which extension is associated with the LibreOffice Impress File?
LibreOffice Impress फ़ाइल से कौन सा एक्सटेंशन जुड़ा है?
.Ist
.wrt
.ods
.odp
Previous Question
Next Question
25
See Explanation !
23
In Which Of The Following View We Can Add Textbox?
निम्नलिखित में से किस व्यू में हम टेक्स्टबॉक्स को जोड़ सकते है?
Slide View
Style View
Handout View
Normal View
Previous Question
Next Question
25
See Explanation !
24
Encryption techniques improve a network
एन्क्रिप्शन तकनीक एक नेटवर्क में सुधार करती है
Performance
Reliability
Security
Longevity
Previous Question
Next Question
25
See Explanation !
25
What does BIOS stand for
BIOS का मतलब क्या है
Basic Input Output System
Binary Integrated Operating System
Basic Integrated Operating Software
Binary Input Output System
Previous Question