Question 1
All the following example of real security and privacy threats except. वास्विक सुरक्षा और गोपनीयता के निम्नलिखित सभी उदाहरण हैं एक को छोड़कर।
Question 2
The example limit of attachment in outlook in and G-mail are…आउटलुक और जीमेल से हम अधिकतम कितना लम्बा अटैचमेंट भेज सकते हैं।
Question 3
Search is search whose hits are restricted to web pages within the current web site. A(n)…… खोज जिनकी हिट्स वर्तमान वेब साइट के भीतर वेब पृष्ठों को प्रतिबंधित कर रहे हैं एक खोज है।
Question 4
Which of the following is not an external threat to the computer or computer network. निम्न में से कौन सा कम्प्यूटर या कम्प्यूटर नेटवर्क के लिए एक बाहरी खतरा नहीं है।
Question 5
A block chain is a growing list of records, which is work on the bases of. एक ब्लॉकचेन रिकॉर्ड की बढ़ती सूचि है, जिसके आधार पर काम किया जाता है।
Question 6
KYC means…….. KYC का मतलब होता है......... ?
Question 7
Which of the following is not belong to cyber security ? साइबर सुरक्षा से संबंधित नहीं है ?
Question 8
Which of the following is used as operating system for mobile phone and tablets मोबाइल फोन और टैबलेट के लिए ऑपरेटिंग सिस्टम है–
Question 9
Which of the following display the contents of the active cell? निम्नलिखित में से कौन एक्टिव सेल के कन्टेट को दीखता है ?
Question 10
Operating system manages ? ऑपरेटिंग सिस्टम का प्रबंधन करता है ?
Question 11
Which of the following is not windows e-mail program? इनमें से कौन विण्डो का ई - मेल प्रोग्राम नहीं है ?
Question 12
The _ protocol has feature that allow uploading of mail message – ……… प्रोटोकॉल के पास ऐसा गुण है जो मेल संदेश को अपलोड करने की अनुमति देता है।
Question 13
Which of the following does not have word processing ? निम्न में से कौन वर्ड प्रोसेसिंग नहीं ?
Question 14
Rout redistribution is the process of introducing external routes into an _ network. बहरी रूट को सर्च करने का रूट रिडिस्ट्रीब्यूशन एक प्रक्रिया है.......नेटवर्क का।
Question 15
……. Is the result produce by a computer. कम्प्यूटर द्वारा ……… उत्पन्न होता है।
Question 16
IPV4 address is of how many bits– IPV4 एड्रेस कितने बिट्स का होता है।
Question 17
The most important system software of computer is the – कम्प्यूटर का सबसे महत्वपूर्ण सिस्टम सॉफ्टवेयर ......... है।
Question 18
DVD is based on. डी.वी.डी. ....... पर आधारित है।
Question 19
UNIVAC is …….. UNIVAC …….. है।
Question 20
A double sides magnetic disk pack that has six disks normally use _ surface for this pack. छह डिस्क वाला एक दो तरफा चुम्कीय डिस्क पैक सामन्यता ....... सतहों का उपयोग करता है।
Question 21
Which layer of international standard organisation OSI model is responsible for creating and recognising frame boundaries ? इंटरनेशनल स्टेण्डर्ड ओर्गनइजेशन OSI मॉडल की सी परत फ्रेम सीमारेखा को बनाने और पहचानने के लिए जिम्मेदार है।
Question 22
For a browser to connect to other resource, the location or address of the resource must be specified. These address are called किसी अन्य ब्रॉउजर से कनेक्ट करने के लिए, संसाधनों का स्थान या पता निर्दिष्ट किया जाना चाहिए ईन पते को बुलाया जाता है।
Question 23
Which of the following choices is not available in the “select a category” drop down menu of the insert function dialog box ? इन्सर्ट फंक्शन डायलॉग बॉक्स के “select a category” ड्रॉप डाउन मेन्यू में कौन सा विकल्प उपलब्ध नहीं होता है।
Question 24
IBM 1404 is
Question 25
Extension of calc spreadsheet file is…….कैल्फ स्प्रेडशीट फाइल का एक्टेंशन होता है।
Question 26
POS mean – POS का अर्थ है।
Question 27
When was the word’ s first laptop computer introduced in the market and by whom? मार्केट में विश्व का पहला लैपटॉप कब और किसके द्वारा आया ?
Question 28
CAD stand for कैड का पूर्ण अर्थ है........।
Question 29
Access times is – एक्सेस टाइम है.......।
Question 30
What is validity period of cheque ? चेक की वैधता होती है।
Question 31
Daisy wheel printer is a types of - डैसिव्हील प्रिंटर प्रकार है।
Question 32
Which of following is used for calculation work. गणना कार्य के लिए निम्नलिखित में से किसका उपयोग किया जाता है।
Question 33
Who build the world’s first electronic calculator using telephone relays, light bulbs and batteries. किसने विश्व का पहला इलैक्ट्रॉनिक कैल्कुलैटर बनाया टेलीफोन रिलेस, लाइट बल्ब और बैटरी का प्रयोग करके।
Question 34
Magnetic disk is the most popular medium for. मैग्नेटिक डिस्क बहुत ही प्रसिद्ध माध्यम है के लिए ........।
Question 35
Which of the following is a search engine? इनमें से कौन सा एक सर्च इंजन है।
Question 36
Which of the following methods can be used to enter data in a cell? निम्न विधियों में से कौन सा एक मैथेड डेटा इंटर करने के लिए इस्तेमाल किया जा सकता है।
Question 37
Port number for SMTP protocol is– एसएमटीपी प्रोटोकॉल का पोर्ट नंबर ........ है।
Question 38
Operating system is used in ऑपरेटिंग सिस्टम का प्रयोग ........ में होता है।
Question 39
Sending a file from your personal computer’ s memory or disk to another computer is called अपने पर्शनल कम्प्यूटर की मैमोरी या डिस्क से कोई फाइल अन्य कंप्यूटर पैर भेजने को क्या कहा जाता है |
Question 40
WAIS stands for का पूर्ण नाम है।
Question 41
We can delete the maximum number of e – mail at a time is – एक समय पर हम ई मेल की अधिकतम संख्या ....... को मिटा सकते हैं।
Question 42
The world wide web is composed of वर्ल्ड वाइड वेब बनाया जाता है |
Question 43
Adhara is आधार है ?
Question 44
Which of the following is the type of cyber security? निम्न में से कौन साइबर सुरक्षा का प्रकार है |
Question 45
Which type of the fonts are best suit to display large amount of the text? टेक्स्ट की बड़ी मात्रा को दर्शाने के लिए इनमे से किसी प्रकार का फ़ॉन्ट उपयुक्त है |
Question 46
Which of the following method is right to securing your mobile निम्न में से कौन सी विधि आपके कंप्यूटर को सुरक्षित करने के लिए सही है |
Question 47
For your E-mail PGP allows you to. आपके ईमेल के लिए आपको अनुमति देती है |
Question 48
Skype is one of the best स्काइप में से एक है |
Question 49
HTML is an acronym for – एच.टी.एम.एल. के लिए संक्षिप्त एक शब्द है ?
Question 50
A bit of text that’s automatically inserted at the bottom of every sent message is known as- वो टेक्स्ट जो अपने आप हर मैसेज के निचे आ जाता है |
Question 51
A web browser a software program that allows you to browser, search and receive various type of information such as website, image, video and audio file and other document on the web .
Question 52
The uniform resource locator (URL) is a standard for specifying any kind of information on the internet.
Question 53
Google pay are mobile wallet.
Question 54
Hardware is the physical structure of computer and software refers the program needed for computer to perform jobs.
Question 55
The full form of NA BARD is National Bank for Agriculture and Rural Development
Question 56
A file which contains ready made style that you can for your Libra Office impress presentation is called template.
Question 57
Port number for IMAP protocol is 143. IMAP.
Question 58
Search engine maintain heavy database of keyword and URL’s ?
Question 59
Cylinder, cone, and pyramid are all chart types in LibreOffice.
Question 60
In LibreOffice calc, if we write formula =3+4*5 then result is 35, but =(3+4)*5 then result is 23.
Question 61
LibreOffice calc provides an Auto calculate feature which by default, will display the SUM of values in a selected range.
Question 62
Back button in a browser is used to visit the previous page that referred you to the page you are currently located at.
Question 63
A firewall as part of a router program filters packet travelling from and to internet from the internet.
Question 64
FTP is file transfer.
Question 65
In LibreOffice impress pressing Es c key during the slide show ends the presentation.
Question 66
Shortcut of hyperlink is Ctrl + K in LibreOffice.
Question 67
System bus is used to connect CPU to a centre switch.
Question 68
Optical mouse uses tiny camera to detect movement.
Question 69
To switch back to receiving individual message, send the message set list digests.
Question 70
Presentation design regulates the formatting and layout for the slide and is commonly called placeholders.
Question 71
Ctrl + F perform same operation in LibreOffice writer and LibreOffice calc.
Question 72
The email message window is used to compose and send an email message.
Question 73
A bank cell has the numeric value of blank.
Question 74
The two dimensional representation of an image is known as image resolution.
Question 75
AEPS mean Adhara enable payment system which requires Adhara for authentication.
Question 76
BHIM mean Bharat interface for money is a digital payment system launched on 30.12.2016.
Question 77
In LibreOffice writer, the easiest way to resize a picture is by dragging its edges to match the size and shape you want.
Question 78
Because of increasing IM integration in popular application, IM network are particularly vulnerable to a worm attack.
Question 79
One of the options available to the presentation during a slide show in impress is transition.
Question 80
Sent item/send box is the box where copies of sent messages saved.
Question 81
IMPS stand for immediate payment service.
Question 82
Two people can have same email address.
Question 83
The FTP protocol is the client/server program used to retrieve the document.
Question 84
OTP (One time password) is used for safe login and safe online transfer of money.
Question 85
[Ctrl] + [End] move the last cell containing contents in the LibreOffice calc spread sheet.
Question 86
To start pine program, choose the option from the menu by pressing and .
Question 87
ISDN is an example of circuit switched network.
Question 88
As per email netiquettes, one store large amounts of old mail that you no longer need.
Question 89
GUI operating system is much easier for end-user to learn and use because commands do not need to be knows memorise.
Question 90
Left key of mouse is used to open Pop-up menu.
Question 91
When responding to posts, you should only say things that you would be willing to say when you meet then face to face.
Question 92
Data can be transmitted using the OSI model.
Question 93
Telnet service enables an internet to log in to another computer on the internet from his/her local computer.
Question 94
Maximum size of a page in most word processor is limited to 22 inch × 22 inch.
Question 95
To deliver a message to the correct application program running on a host, the port address must be consulted.
Question 96
Classifying content in social media happens through an activity such as tagging.
Question 97
Face book is social network site.
Question 98
To organise you bookmark menu into section, add separators.
Question 99
Ctrl + A method select the full page open.
Question 100
Security in e-commerce means protecting an organisation's data resource from unauthorized access.