Loading more MCQs...

JKSSB Computer Awareness MCQs

Please Login to view more and Get a subscription to view all 990 questions. You can view 30 questions without a subscription.
Question 1 of 990

In an e-Office system, a confidential file is sent digitally from a section officer to a higher authority. The department wants to ensure that only the intended officer can read the file during transmission. Which of the following ensures confidentiality during transmission?

Explanation

The correct answer is B) Encrypting the file using the recipient's public key.

In the context of Public Key Infrastructure (PKI) and digital security, different tools serve different purposes. To ensure confidentiality (making sure only the intended recipient can read it), encryption is required.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11067

Question 2 of 990

Which of the following is incorrect regarding the use of modern computer applications in field operations of a Forest Department?

Explanation

The incorrect statement is C) Forest apps replace the need for physical field inspections completely.

Modern computer applications significantly enhance the efficiency of Forest Department operations, but they do not eliminate the necessity for on-ground presence.

Analysis of the Statements:

  • A) Mobile apps for photographs (Correct): Field staff use specialized apps to document tree health, illegal felling, or wildlife sightings. These photos often serve as legal evidence in "damage cases."

  • B) GIS-enabled apps (Correct): Geographic Information Systems (GIS) allow officers to overlay GPS coordinates of their current location with satellite imagery to monitor forest cover changes, boundary encroachments, and fire hotspots in real-time.

  • C) Replacing physical inspections (Incorrect): While apps streamline data collection, physical inspections are still mandatory for verifying ground realities, interacting with local communities, and performing tasks that sensors or cameras cannot (like manual soil testing or marking trees for silvicultural operations).

  • D) Working without network (Correct): Many professional field apps (like QField or ArcGIS Field Maps) are designed for offline use. Since forests often have poor connectivity, data is stored locally on the device and synchronized with the central server once the staff returns to a network zone.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11066

Question 3 of 990

Which of the following statements is correct regarding computer viruses and modern antivirus systems?

Explanation

The correct answer is B) Signature-based antivirus detects only previously identified malware patterns.

Here is a detailed look at why this statement is true and why the others are misconceptions:

  • Signature-based Detection (True): This traditional method works like a "Most Wanted" list. The antivirus compares the code of files on your computer against a database of known malware "signatures" (unique strings of bits). If it hasn't seen that specific pattern before, it won't flag it.

  • A) Execution (False): By definition, a computer virus usually requires a host program to be executed or some form of user action (like opening an attachment or running an infected .exe) to begin its spread. In contrast, a Worm is the type of malware that can self-replicate and spread across networks automatically without user intervention.

  • C) Zero-day Attacks (False): A Zero-day attack exploits a vulnerability that is unknown to the software vendor or antivirus company. Since there is no "patch" or "signature" yet, online registration or standard antivirus updates cannot guarantee protection against them. Only advanced Heuristic/Behavioral analysis can help mitigate these.

  • D) Firewall vs. Antivirus (False): They are distinct layers of security. A Firewall acts as a barrier for network traffic (checking "who" is coming in and out of your internet connection), while an Antivirus scans and monitors the "files" and "programs" already on or entering your system to find malicious code.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11065

Question 4 of 990

Which of the following statements is true regarding KMZ files and geo-tagged photos?

Explanation

The correct answer is B) Geo-tagging embeds latitude and longitude inside image metadata.

Here is the technical breakdown of how these technologies work:

  • Geo-tagging (True): When you take a photo with a GPS-enabled device, the coordinates (latitude, longitude, and often altitude) are written into the EXIF (Exchangeable Image File Format) metadata of the image. This data travels with the file, allowing mapping software to pin the photo to a specific location.

  • KMZ Files (A & C are False): A KMZ file is a compressed (zipped) version of a KML (Keyhole Markup Language) file. It is specifically designed to store geographic data, including coordinates, 3D models, and images. Because it is a zip file, it can "bundle" images together with their corresponding location data so they can be viewed in applications like Google Earth.

  • Automatic Creation (D is False): Simply uploading a geo-tagged photo does not automatically generate a KMZ file. A KMZ must be specifically created or "saved as" using GIS (Geographic Information System) software or mapping tools to package the image and its coordinates into that specific format.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11064

Question 5 of 990

A student uploads a PDF file to an online PDF-to-JPG converter website. After conversion, he downloads the JPG files but later notices:

  1. The images are blurred

  2. File size is much larger than expected

  3. Text cannot be copied anymore

Which of the following is the most accurate reason?

Explanation

The correct answer is A) The PDF was converted into raster images.

This scenario highlights the fundamental difference between Vector and Raster formats:

  • Rasterization: A PDF often contains vector data (like text and shapes) which is mathematically defined and infinitely scalable. When you convert it to a JPG, the website "rasterizes" the content, turning it into a fixed grid of pixels.

  • Blurriness: Because JPGs are raster images, if the conversion resolution (DPI) is low, the images will appear blurred or pixelated when viewed at full size.

  • Larger File Size: Unlike text in a PDF, which takes up very little space, a JPG must store color information for every single pixel in the image. This often leads to a larger file size than the original text-based PDF.

  • Text Selection: Since the JPG is now just a "picture" of the text, the computer no longer recognizes individual characters. You cannot highlight or copy text unless you use OCR (Optical Character Recognition) software.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11063

Question 6 of 990

A government launches a system where:

  • Citizens apply for documents online

  • Applications are automatically verified using databases

  • SMS/email updates are sent automatically

  • Officials approve requests digitally

  • Data is stored centrally and accessed across departments

Which of the following best explains the real contribution of Information Technology (IT) in this system

Explanation

The correct answer is C) IT integrates communication, data processing, storage, and automation.

This scenario perfectly illustrates a comprehensive E-governance framework. Information Technology is not just a single tool here; it acts as an integrated system that transforms the entire workflow:

  • Communication: Automated SMS/email updates keep the citizen informed without manual intervention.

  • Data Processing: Automatic verification against databases ensures accuracy and speed that a human could not match manually.

  • Storage: Centralized data storage allows different departments to access the same information, eliminating the need for a citizen to submit the same document multiple times (the "Once-Only" principle).

  • Automation: The system handles routine tasks (routing applications, checking records), allowing officials to focus only on the final digital approval.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11062

Question 7 of 990

A student is using a computer with 8 GB RAM. He opens:

  • A web browser with 25 tabs

  • A video editing software

  • A music player

  • A code editor

After some time, the system becomes slow, but it does NOT crash. The hard disk activity light keeps blinking continuously even though he is not saving or opening files. Which of the following is the most accurate explanation?

Explanation

The correct answer is C) The operating system is using virtual memory and swapping data between RAM and disk.

This scenario describes a classic case of Thrashing. Here is why:

  • Memory Overload: The student has opened several heavy applications (video editing, many browser tabs) that collectively require more than the available 8 GB of RAM.

  • Virtual Memory & Swapping: When RAM is full, the Operating System uses a portion of the hard disk (the Page File or Swap Space) as "Virtual Memory." It moves (swaps) data currently not in use from the RAM to the disk to make room for active tasks.

  • The "Slow" Effect: Hard disks (even SSDs) are significantly slower than RAM. The continuous blinking of the disk light indicates that the OS is frantically moving data back and forth between the RAM and the disk. This process is called Swapping.

  • Why it doesn't crash: The system remains functional because Virtual Memory allows it to handle more data than the physical RAM permits, though performance drops drastically.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11061

Question 8 of 990

Match the following:

Column -I --- Column - II

i. Firmware --- a. Translates high-level language into machine code

ii. Utility Software --- b. Controls communication between the operating system and the hardware device

iii. Device Driver --- c. Stored permanently in ROM to initialize hardware

iv. Compiler --- d. Performs system maintenance tasks like disk cleanup

Choose the correct option:

Explanation

  • i. Firmware (i - c): This is a specific type of software "baked" into the hardware. It is stored permanently in ROM (Read-Only Memory) and provides the necessary instructions on how a device communicates with other computer hardware.

  • ii. Utility Software (ii - d): This software is designed to help analyze, configure, optimize, or maintain a computer. Examples include disk cleanup, antivirus, and file compression tools.

  • iii. Device Driver (iii - b): A specialized program that allows the operating system to communicate with a specific hardware device (like a printer or graphics card). Without the driver, the OS wouldn't know how to "talk" to the hardware.

  • iv. Compiler (iv - a): A language processor that translates an entire program written in high-level language (like C++ or Java) into machine code (binary) at once before execution.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11060

Question 9 of 990

Which of the following statements is true regarding applications of Information Technology?

Explanation

  • A) E-governance (False): While E-governance makes services more efficient and accessible online, it does not entirely eliminate the need for physical offices. Many administrative tasks, legal verifications, and physical infrastructure management still require on-site government presence.

  • B) E-commerce (False): E-commerce is not limited to physical goods. It also includes the sale of digital products (e-books, software) and services (streaming subscriptions, travel bookings, and online consultations).

  • C) Telemedicine (True): This is a core application of IT in healthcare. It enables healthcare professionals to evaluate, diagnose, and treat patients at a distance using telecommunications technology like video calls and remote monitoring.

  • D) Online education (False): The primary benefit of online education is that students do not need to be physically present. They can access lectures and materials from any location with an internet connection.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11059

Question 10 of 990

A computer uses 8-bit 2's complement representation. Which of the following operations will cause overflow?

Explanation

Note: Options A,B, C cause overflow but As per the Provisional Answer Key Option C is Correct

In 8-bit 2's complement representation, the range of representable integers is -128 to +127. An overflow occurs when the result of an addition falls outside this range. This happens if:

  1. Two positive numbers are added and the result is negative (MSB is 1).

  2. Two negative numbers are added and the result is positive (MSB is 0).

Based on the calculations, Options A, B, and C all cause an overflow.

Detailed Analysis:

  • Option A: $01010101 + 00110011$

    • Decimal: $85 + 51 = 136$.

    • $136$ is greater than the maximum limit of $127$.

    • Binary result: $10001000$ (The MSB is 1, interpreting two positive numbers as a negative result).

    • Result: Overflow.

  • Option B: $10011001 + 10101010$

    • Decimal: $-103 + (-86) = -189$.

    • $-189$ is less than the minimum limit of $-128$.

    • Binary result: $01000011$ (The MSB is 0, interpreting two negative numbers as a positive result).

    • Result: Overflow.

  • Option C: $01111111 + 00000001$

    • Decimal: $127 + 1 = 128$.

    • $128$ is greater than the maximum limit of $127$.

    • Binary result: $10000000$ (The largest positive number plus one yields the smallest negative number).

    • Result: Overflow.

  • Option D: $11110000 + 00010000$

    • Decimal: $-16 + 16 = 0$.

    • $0$ is within the range $[-128, 127]$.

    • Binary result: $00000000$.

    • Result: No Overflow.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 11058

Question 11 of 990

Which key is used to start a slide show from the beginning?

Explanation

The correct answer is:

F5

Explanation:
In Microsoft PowerPoint, pressing F5 starts the slide show from the beginning.

  • F1 → Help

  • F7 → Spelling check

  • F9 → Refresh/other functions

✔️ So, the correct key is F5.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10762

Question 12 of 990

Which type of query retrieves data based on a condition?

Explanation

The correct answer is:

Select Query

Explanation:
A Select Query retrieves data from a database and can apply conditions (using WHERE clause) to filter records.

Other queries:

  • Update Query → Modifies existing data

  • Append Query → Adds records to a table

  • Delete Query → Removes records

✔️ So, data based on a condition is retrieved using a Select Query.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10761

Question 13 of 990

_______ symbol is used to start a formula in Excel

Explanation

The correct answer is:

=

Explanation:
In Microsoft Excel, every formula must start with the equals sign (=) so Excel knows you’re entering a formula and not plain text.

✔️ So, the symbol used to start a formula in Excel is =

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10760

Question 14 of 990

The following feature in Word allows you to combine letters with a database of addresses?

Explanation

The correct answer is:

Mail Merge

Explanation:
Mail Merge in MS Word allows you to combine a standard letter with a database of addresses or other data (like names, addresses) to create personalized documents.

Other options:

  • Track Changes → Tracks edits

  • Header & Footer → Adds info at top/bottom

  • AutoCorrect → Corrects spelling automatically

✔️ So, the correct feature is Mail Merge.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10759

Question 15 of 990

Which of these protocols ensures secure email transmission?

Explanation

The correct answer is:

SSL/TLS

Explanation:
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) encrypt email data, ensuring secure transmission and protecting it from interception.

Why others are not correct:

  • FTP → File transfer, not secure email

  • HTTP → Web browsing (not secure by default)

  • TCP → Data transport protocol, no encryption

✔️ So, secure email transmission is ensured by SSL/TLS.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10758

Question 16 of 990

In an email address, the symbol "@" separates:

Explanation

The correct answer is:

User Name and Domain Name

Explanation:
In an email address (for example, user@gmail.com):

  • user → User name

  • @ → Separator

  • gmail.com → Domain name

So, the "@" symbol separates the user name and the domain name ✔️

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10757

Question 17 of 990

Full Form of ISP?

Explanation

The correct answer is:

Internet Service Provider

Explanation:
An ISP (Internet Service Provider) is a company or organization that provides users access to the internet (like Jio, Airtel, BSNL, etc.).

The other options are incorrect expansions of ISP.

✔️ So, the full form of ISP is Internet Service Provider.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10756

Question 18 of 990

The binary number equivalent to decimal 10 is:

Explanation

The correct answer is:

1010

Explanation:
Decimal 10 in binary is:

10 ÷ 2 = 5 → remainder 0
5 ÷ 2 = 2 → remainder 1
2 ÷ 2 = 1 → remainder 0
1 ÷ 2 = 0 → remainder 1

Reading remainders from bottom to top → 1010

✔️ So, the binary equivalent of decimal 10 is 1010.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10755

Question 19 of 990

The smallest unit of data in a computer is called:

Explanation

The correct answer is:

Bit

Explanation:
A bit (binary digit) is the smallest unit of data in a computer and can have a value of 0 or 1.

  • Byte = 8 bits

  • Word = A group of bits processed together

  • Block = A collection of data units

So, the smallest unit is Bit ✔️

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10754

Question 20 of 990

Which generation of computers introduced the concept of integrated circuits (ICs)

Explanation

The correct answer is:

Third generation

Explanation:

  • First generation → Vacuum tubes

  • Second generation → Transistors

  • Third generationIntegrated Circuits (ICs)

  • Fourth generation → Microprocessors

So, integrated circuits were introduced in the third generation of computers 👍

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10753

Question 21 of 990

Which input device reads characters printed using special magnetic ink?

Explanation

MICR stands for Magnetic Ink Character Recognition. It is a technology used primarily by the banking industry to facilitate the processing and clearance of cheques and other documents.

  • How it works: Characters are printed using a special ink or toner that contains iron oxide (magnetic) particles. The MICR reader magnetizes the ink and then translates the magnetic signal into characters.

  • Why the others are incorrect:

    • OCR (Optical Character Recognition): Uses light/optics to read regular printed or handwritten text and convert it into machine-encoded text.

    • OMR (Optical Mark Recognition): Detects the presence or absence of a mark in a specific position, such as on bubbles in objective-type exam sheets.

    • Bar Code Reader: Uses a laser beam or light to read the widths of dark and light parallel lines (bars) to identify products.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10752

Question 22 of 990

Which output device is most appropriate for printing large engineering drawings?

Explanation

A Plotter is a specialized output device designed to print high-quality vector graphics on very large sheets of paper.

  • Why it is most appropriate: Unlike standard printers that use dots (raster images) to form characters, plotters use pens or robotic arms to draw continuous, precise lines. This makes them ideal for technical documents like engineering blueprints, architectural plans, and CAD drawings where scale and precision are critical.

  • Limitations of others: Laser and Inkjet printers are generally limited to standard paper sizes (A4/A3) and can lose detail when scaling up very large technical schematics. Dot matrix printers are far too low-resolution for modern engineering requirements.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10751

Question 23 of 990

Which of the following firmware is responsible for initializing hardware and loading operating system?

Explanation

The BIOS (Basic Input/Output System) is the firmware embedded on a computer's motherboard. Its primary job is to perform the POST (Power-On Self-Test), which initializes and tests the hardware components (like RAM, keyboard, and storage) before handing over control to the Boot Loader to load the Operating System.

  • Why the others are incorrect:

    • Device driver: This is software that allows the OS to communicate with a specific piece of hardware after the system has already started.

    • Compiler: This is a tool used by developers to translate source code (high-level language) into machine code; it has no role in the boot process.

    • Kernel: The kernel is the core part of the operating system itself. It is loaded by the BIOS/Boot Loader, rather than being the component that initializes the hardware.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10750

Question 24 of 990

The highest data transfer rate is provided by which of the following of the storage device?

Explanation

Among the options listed, the Solid State Drive (SSD) provides the highest data transfer rates because it uses flash memory and has no moving parts.

  • Why it is faster: Unlike Hard Disk Drives (HDDs), Magnetic Tapes, or Optical Disks—all of which rely on physical spinning or mechanical movement to read/write data—SSDs access data electronically. This results in significantly lower latency and much higher read/write speeds.

  • Comparison: While a standard HDD might transfer data at around 150 MB/s, modern SSDs can reach speeds of 500 MB/s (SATA) to over 7,000 MB/s (NVMe).

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10749

Question 25 of 990

Which type of software license lets users see the source code, change it, and share it with others?

Explanation

An Open-source license (like the GPL or Apache License) provides the legal framework that allows users to access the original source code, modify it to suit their needs, and redistribute those versions to others.

  • Why the others are incorrect:

    • Proprietary license: The source code is a trade secret; users are typically only given the right to run the software, not to see or change the code.

    • Freeware license: The software is free to use, but the source code remains closed and protected by the developer.

    • Shareware license: This is "try before you buy" software. It is usually proprietary and closed-source, offered for a limited time or with limited features to encourage a purchase.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10748

Question 26 of 990

Which component of the CPU is responsible for controlling the sequence of operations and managing the flow of data?

Explanation

The Control Unit (CU) acts as the "brain" or coordinator of the CPU. It decodes instructions from memory and generates signals that tell the other components (like the ALU and Registers) what to do and when to do it.

  • Why the others are incorrect:

    • Register: These are small, high-speed storage locations used to hold data temporarily during processing; they don't control the sequence.

    • Cache: This is high-speed volatile memory used to store frequently accessed data to speed up retrieval; it is a storage component, not a control component.

    • ALU (Arithmetic Logic Unit): This component performs the actual mathematical calculations and logical comparisons, but it only does so when directed by the Control Unit.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10747

Question 27 of 990

Which of the following is an open-source mobile operating system?

Explanation

Android is based on the Linux kernel and is released under open-source licenses (primarily the Apache License). This allows developers and manufacturers to modify and distribute the software freely.

  • iOS, Windows Phone, and BlackBerry OS are all closed-source (proprietary) operating systems. This means the source code is kept private by the companies that own them (Apple, Microsoft, and BlackBerry, respectively), and only they can legally modify or distribute the software

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10746

Question 28 of 990

To execute more than one program at a time, the system software used must be capable of

Explanation

Multitasking is the ability of an operating system to execute multiple tasks (programs) seemingly at the same time. It does this by rapidly switching the CPU's attention between different processes.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10745

Question 29 of 990

While a computer is switched on, its operating system software has to stay

Explanation

When a computer is powered on, the Operating System (OS) is loaded from the hard drive (secondary storage) into the RAM (Random Access Memory), which is known as Primary Storage.

  • Why it stays there: The CPU can only access instructions and data that are stored in primary memory. For the OS to manage hardware, run applications, and respond to your commands in real-time, its core components must remain in the RAM as long as the computer is running.

  • Volatile nature: This is also why, when you restart or turn off the computer, the RAM is cleared, and the OS must be "booted" (reloaded) again from the disk drive.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10744

Question 30 of 990

Operating System:

Explanation

  • Links a program with subordinate interferences: This is technically the job of a Linker or Loader, which are system utilities, though they often work within the OS environment.

  • Enables the programmer to draw a flowchart: This is the function of Application Software (like Lucidchart, Visio, or even MS Paint), not the Operating System itself.

  • Provides a layer, user-friendly interface: This is a core function. The OS provides the GUI (Graphical User Interface) or CLI (Command Line Interface) that allows users to interact with the hardware without needing to speak binary.

Report an error

Describe the issue with this question. Our team will review it.

Question ID: 10743

Login to view more questions

Login to Continue
Please Login to view more and Get a subscription to view all 990 questions. You can view 30 questions without a subscription.