Professional Documents
Culture Documents
This question paper contains a total of 50 questions divided into three sections; A, B and C.
Read the instructions carefully before attempting these questions.
4. In a certain code, SIKKIM is written as THLJJL. How is TRAINING written in that code?
(A) SQBHOHOH (B) UQBHOHOF
(C) UQBJOHHO (D) UQBJOHOH
5. If train is called bus, bus is called tractor, tractor is called car, car is called scooter, scooter is called bicycle,
bicycle is called moped, which is used to plough a field?
(A) Train (B) Bus
(C) Tractor (D) Car
6. Arun said, “This girl is the wife of the grandson of my mother.” Who is Arun to the girl?
(A) Father (B) Grandfather
(C) Husband (D) Father-in-law
7. A man is facing west. He turns 45° in the clockwise direction and then another 180° in the same direction
and then 270° in the anticlockwise direction. Which direction is he facing now?
(A) South (B) North-West
(C) West (D) South-West
1 1
Mock Test
8. Which one of the following four logical diagrams represents correctly the relationship between Musicians,
Instrumentalists, Violinists?
(A) (B)
(C) (D)
9. How many pairs of letters in the word ‘CHAIRS’ have as many letters between them in the word as in
the alphabet?
(A) None (B) One
(C) Two (D) Three
10. If + means ÷, − means ×, ÷ means −, × means +, then what will be the value of x, if x ÷ 8 + 6 = 4 − 7 × 3?
97 23
(A) (B) −
3
(C) 12 (D) 14 2
11. Which one of the following is a protocol that is generally used in URL addresses?
(A) HTTP (B) WWW
(C) FTP (D) .com
12. __________ is a program that hijacks your computer and makes it hostage untill you pay a fee.
(A) Ransomware (B) Spyware
(C) Blockware (D) Hostageware
13. Which of these is an advantage of E-mails?
(A) In order to check the E-mail, the recipient of the E-mail needs access to the Internet.
(B) Viruses are easily spread through the E-mail attachments.
(C) There is no guarantee that the E-mail sent by you will be read until the user logs in and checks their
E-mail account.
(D) E-mails can be sent 24 hours a day, 365 days a year.
14. In a binary number system, right most digit before the fractional point is called __________.
(A) MSD (B) HCF
(C) LSD (D) LCM
15. What does “L” in URL stand for?
(A) Location (B) Length
(C) List (D) Locator
16. A relational database developer refers to a record as a/an __________.
(A) Criteria (B) Relation
(C) Tuple (D) Attribute
3 3
Mock Test
26. __________ allows each individual to tackle the subject at their own pace.
(A) E-banking (B) E-reservation
(C) E-governance (D) E-learning
27. A __________ is a software program that protects your computer by acting like a security guard and
monitoring and controlling the Internet traffic coming in and out of your computer. Install one and make
sure it is always turned on.
(A) Modem (B) Router
(C) Anti-virus (D) Firewall
28. Using a head-mounted display, can project 3D objects related to the topic the student is studying which
can better help the student learn.
This is an example of __________.
(A) Virtual reality (B) Simulation
(C) Augmented reality (D) Video games
29. What do we call a network whose elements may be separated by alarge distance? It usually involves
multiple networks and dedicated high-speed telephone lines.
(A) URL (B) LAN
(C) WAN (D) WWW
30. A compiler is a __________.
(A) Person who compiles the program
(B) Memory in which programs are stored
(C) Programmer who develops the programs
(D) A software that converts the source code into machine code
Instruction: Q. 31 to 40 are two-key based questions having four options A, B, C and D out of which TWO are correct.
31. A software program that secretly tracks what you do on the Internet and sometimes gets information
about you from your computer is called __________ and a virus that shows you unwanted advertisements
and pop us it called __________.
(A) Spyware (B) Trojan
(C) Adware (D) Ransomware
41. You have to save name, address, age and chest number is for 2,350 people entered into a half-marathon.
Which application would you use?
(A) Database (B) E-mail
(C) Graphic (D) Multimedia
42. The activities committed using the Internet that violate state, federal, or international laws are termed
as __________.
(A) Hacker (B) Cybercrime
(C) Digital crime (D) Computer crime
5 5
Mock Test
43. What will be the hexadecimal equivalent of the binary number 111111110010?
(A) FF2 (B) 4082
(C) F2F (D) FFF
44. Which is NOT an acceptable method of distributing small power outlets throughout an open plan office area?
(A) Fake ceilings (B) Power skirting
(C) Flush floors (D) Extension cords
45. The collection of information stored in a database at a particular moment is called as a/an __________.
(A) Instance of the database (B) Schema
(C) Data domain (D) Independence
46. Which of the following are the utility software? [OGO SLE, 2022]
(A) Disk Defragmenter (B) PowerPoint
(C) Microsoft Word (D) Notepad
47. __________ is the raw material used as input and information is the processed data obtained as output of
data processing.
(A) Data (B) Output
(C) Program (D) Code
48. Which is NOT a correct tag in HTML?
(A) <HTML/> (B) <IMG>
(C) <BR> (D) </Body>
49. Frederick Cohen gave viruses their definition. He wrote a virus called __________ which as, positive virus.
(A) John Von Neumann (B) EIK Virus
(C) Mac Virus (D) Compression Virus
50. __________ first published an article in 1949 which was based on modern day viruses. It was called ‘Theory
of self-reproducing Automata’.
(A) John Von Neumann (B) Richard Adleman
(C) Adware Jones (D) Theory of Destructive Automata
Answer
1. A 2. D 3. C 4. B 5. D 6. D 7. D 8. A 9. C 10. A
11. A 12. A 13. D 14. C 15. D 16. C 17. C 18. C 19. B 20. A
21. D 22. A 23. B 24. D 25. D 26. D 27. D 28. C 29. C 30. D
31. A,C 32. B,D 33. B,D 34. C,D 35. B,C 36. B,D 37. A,B 38. B,C 39. A,C 40. A,D
41. A 42. B 43. A 44. D 45. A 46. A 47. A 48. A 48. D 50. A