Explanation:
Information is represented using binary code, where data is stored as combinations of 0s and 1s.
Correct Answered:
Wrong Answered:
1. Which of the following best describes how information is represented inside a computer system?
A
Information is stored as analog signals because they provide more accurate data representation.
B
Information is stored in text format only,which computers interpret directly as commands.
C
Information is represented using decimal numbers for all processing and storage tasks.
D
Information is represented using binary code, where data is stored as combinations of Os and 1s.
Information is represented using binary code, where data is stored as combinations of 0s and 1s.
Correct Answered:
Wrong Answered:
2. Which of the following demonstrates the application of Information Technology in India to enhance public services?
A
Integration of blockchain technology in banking operations.
B
Implementation of the Aadhaar biometric identification system
C
Use of low-level programming languages in government applications
D
Deployment of Sewa Kendra at every district Headquarter.
Implementation of the Aadhaar biometric identification system
Correct Answered:
Wrong Answered:
3. What is the main disadvantage of using assembly language in programming?
A
Assembly language programs run slower than high-level language programs because they require more CPU сcycles.
B
Assembly language is hardware-dependent, making programs less portable across different computer systems.
C
Assembly language automatically manages memory, which can lead to unpredictable behavior.
D
Assembly language code is easier to write and understand compared to high-level languages, but harder to debug.
Assembly language is hardware-dependent, making programs less portable across different computer systems.
Correct Answered:
Wrong Answered:
4. What role does the RSA algorithm play in computer communication systems?
A
It compresses data to reduce transmission time and improve network efficiency.
B
It encrypts and decrypts messages to ensure secure data exchange between parties.
C
It helps in routing decisions by verifying the authenticity of network nodes.
D
It detects errors in data transmission by using mathematical checksums.
It encrypts and decrypts messages to ensure secure data exchange between parties.
Correct Answered:
Wrong Answered:
5. What best describes the relationship between firmware, hardware, and humanware in a computer system?
A
Firmware provides the physical structure that users (humanware) interact with, making it the bridge between software and hardware.
B
Human-ware develops and operates software systems, while firmware acts as a specialized form of software that manages hardware functions.
C
Firmware is used exclusively by human-ware to create application-level interfaces for end users.
D
Human-ware includes only end-users, while firmware refers to software stored on the hard disk for temporary boot processes.
Human-ware develops and operates software systems, while firmware acts as a specialized form of software that manages hardware functions.
Correct Answered:
Wrong Answered:
6. Which of the following statements is NOT true about software?
A
Software is a collection of programs, procedures, and related documentation.
B
Once developed and tested, software requires no further maintenance.
C
Software becomes obsolete due to changes in the environment or requirements.
D
Software can be classified into system software and application software.
Once developed and tested, software requires no further maintenance.
Correct Answered:
Wrong Answered:
7. Arrange the following storage media in ascending order of storage density.
A
Magnetic Tape → Optical Disc → Hard Disk Drive →→Solid State Drive
B
Optical Disc → Solid State Drive → Magnetic Tape → Hard Disk Drive
C
Magnetic Tape Hard Disk Drive Optical Disc → Solid State Drive
D
Hard Disk Drive → Magnetic Tape → Solid State Drive Optical Disc
Magnetic Tape → Optical Disc → Hard Disk Drive → Solid State Drive
Correct Answered:
Wrong Answered:
8. Which of the following is not a Peripheral?
A
Pen Drive
B
Mouse
C
TouchPad
D
Printer
TouchPad, however, is built into laptops as a primary input device and is considered part of the core hardware, not an external peripheral.
Correct Answered:
Wrong Answered:
9. Which of the following components of a computer system is primarily responsible for executing instructions and performing arithmetic and logical operations during data processing?
A
Control Unit (CU)
B
Random Access Memory (RAM)
C
Input/Output Controller
D
Arithmetic Logic Unit (ALU)
The ALU (Arithmetic Logic Unit) is a key component of the CPU responsible for:
Performing arithmetic operations (addition, subtraction, multiplication, division)
Performing logical operations (comparisons like greater than, equal to, AND, OR)
Correct Answered:
Wrong Answered:
10. Which of the following best explains the function of the operating system (OS) in managing hardware and software resources on a computer?
A
The OS translates high-level programming languages into machine code so that applications can run directly on the hardware.
B
The OS manages hardware, provides a user interface, and allocates resources like CPU, memory, and storage between applications and hardware.
C
The OS take a program instruction by instruction and computes its output.
D
The OS primarily functions as a web browser that facilitates internet connectivity and online communications.
The OS manages hardware, provides a user interface, and allocates resources like CPU, memory, and storage between applications and hardware.
Correct Answered:
Wrong Answered:
11. What is the main difference between data and information in computer science?
A
Data and information are the same.
B
Information is unprocessed facts, while data is organized and meaningful.
C
Data is raw and unprocessed, while information is processed and meaningful.
D
Information is stored in binary, while data is not.
Data is raw and unprocessed, while information is processed and meaningful.
Correct Answered:
Wrong Answered:
12. Which device is primarily responsible for connecting different networks and making decisions based on IP addresses to forward data packets?
A
VLAN
B
Router
C
Repeater
D
Bridge
A router is a networking device that connects different networks (for example, your home network to the internet) and makes forwarding decisions based on IP addresses.
Correct Answered:
Wrong Answered:
13. How do most modern antivirus solutions detect suspicious files that may contain viruses or malware?
A
By matching file signatures and using heuristic analysis to detect abnormal behavior.
B
By encrypting the file system and checking hashes against a global ledger.
C
By monitoring network traffic and source IPs to block threats before download.
D
By analyzing code behavior and alerting if it resembles a virus.
By matching file signatures and using heuristic analysis to detect abnormal behavior.
Correct Answered:
Wrong Answered:
14. Which of the following techniques is commonly used by advanced computer viruses to avoid detection by antivirus software and maintain persistence on an infected system?
A
Using polymorphic code that changes its appearance each time it infects a new file, making signature-based detection difficult.
B
Utilizing public-key cryptography to encrypt payloads and trigger execution only upon receiving a remote key from a command-and-control server.
C
Altering system-level DNS resolver cache entries to redirect legitimate domain queries to attacker-controlled IP addresses.
D
Injecting kernel-mode rootkits that intercept system calls to hide files, processes, and network connections from security tools.
Injecting kernel-mode rootkits that intercept system calls to hide files, processes, and network connections from security tools.
Correct Answered:
Wrong Answered:
15. Which of the following best describes the purpose of DKIM (DomainKeys Identified Mail) in email security?
A
It encrypts the entire email message to ensure only the recipient can read it.
B
It verifies that the sender's IP address is authorized to send email for the domain.
C
It adds a digital signature to the email header, enabling the receiver to verify the email's authenticity and integrity.
D
It blocks spam emails by checking the sender's IP reputation against a global blacklist.
It adds a digital signature to the email header, enabling the receiver to verify the email's authenticity and integrity.
Correct Answered:
Wrong Answered:
16. What does IPv6 stand for, and what is its primary improvement over IPv4?
A
Internet Packet Version 6; it introduces encrypted headers and replaces TCP for end-to-end transmission.
B
Internet Protocol Version 6; it expands the address space from 32-bit to 128-bit, allowing for vastly more unique IP addresses.
C
Interconnect Protocol Virtual 6; it uses MAC addressing for global routing and replaces ARP with NAT.
D
Internet Pathway Version 6; it eliminates IP routing and uses direct DNS-based addressing for all traffic.
Internet Protocol Version 6; it expands the address space from 32-bit to 128-bit, allowing for vastly more unique IP addresses.
Correct Answered:
Wrong Answered:
17. Which of the following best describes the difference between Microsoft Excel and Microsoft Access in terms of their primary functionalities?
A
Microsoft Excel is optimized for relational database management, while Microsoft Access is designed for advanced data visualization and charting.
B
Microsoft Excel is primarily a spreadsheet tool for data analysis and calculations, while Microsoft Access is a database management system for handling structured data and relationships.
C
Microsoft Excel is used for creating and managing large-scale databases, while Microsoft Access is used for performing statistical analysis and creating pivot tables.
D
Microsoft Excel is a tool for managing unstructured data, while Microsoft Access is a tool for creating and editing documents
Microsoft Excel is primarily a spreadsheet tool for data analysis and calculations, while Microsoft Access is a database management system for handling structured data and relationships.
Correct Answered:
Wrong Answered:
18. In Excel, you have a dataset with dates in column A and sales amounts in column B. You want to calculate the total sales for the month of March 2025 using a single formula. Which of the following formulas will correctly calculate this?
(i) =SUMIFS(B:B, A:A, ">=03/01/2025", A:A, "<=03/31/2025")
(ii) =SUMPRODUCT((MONTH(A:A)=3)*(YEAR(A:A)=2025)*B:B)
(iii) =SUMIF(A:A, "March 2025", B:B)
(iv) =SUM(IF((TEXT(A:A,"mmmm yyyy")="March 2025"), B:B, 0)) (entered as an array formula)
Which formula(s) will correctly calculate the total sales for March 2025?
A
Only ii and iii
B
Only i, iii and iv
C
Only i, ii, and iv
D
All of the above
Only i, ii, and iv
Correct Answered:
Wrong Answered:
19. Sofi wrote a book with many chapters and wanted to create a Table of Contents in her document. She clicked References >Table of Contents, but a message appeared saying, "No entry of data was found" What could be one of the reasons for this message?
A
She did not change the size of chapter titles.
B
She did not apply heading styles to the chapter titles.
C
She did not update the Table of Contents.
D
She used an unsupported file format.
In Microsoft Word, the Table of Contents (TOC) is generated automatically from text formatted with built-in Heading styles (like Heading 1, Heading 2, etc.).
If Sofi didn’t apply these heading styles to her chapter titles, Word won’t find any entries to include in the TOC — resulting in the message "No entry of data was found."
Correct Answered:
Wrong Answered:
20. Which algorithm is used by Google Maps to calculate the fastest route based on travel time?
A
Breadth-First Search (BFS)
B
Depth-First Search (DFS)
C
Dijkstra's Algorithm
D
Bellman-Ford Algorithm
Explanation:
Google Maps and other navigation systems use graph-based shortest path algorithms to determine the fastest route between two points.
The road network is represented as a graph where:
Nodes (vertices) = intersections or locations
Edges = roads with weights representing travel time or distance
Why Dijkstra’s Algorithm?
It efficiently finds the shortest (or fastest) path from a source node to all other nodes in a weighted graph with non-negative edge weights.
Google Maps often combines Dijkstra’s algorithm with A* (A-star) search and real-time traffic data for better performance and accuracy.
Correct Answered:
Wrong Answered:
21. Which of the following was an output device used in the first generation of computers?
A
Vacuum Tubes
B
Paper Tapes
C
Punched Cards
D
Magnetic Tapes
| Device | Function | Used for |
|---|
| Vacuum Tubes | Acted as electronic switches and amplifiers | Processing (not I/O) |
| Paper Tapes | Medium for input and sometimes data storage | Input |
| Punched Cards | Used to input data and also as output (results were punched on cards) | Output device |
| Magnetic Tapes | Used later for data storage | Storage |
Correct Answered:
Wrong Answered:
22. Which of the following is an example of open-source technology?
A
Microsoft Office
B
LibreOffice
C
FreeOffice
D
WPS Office
LibreOffice is a free and open-source office suite developed by The Document Foundation.
Source code is publicly available.
Users can modify, distribute, and use it freely.
Other options:
Microsoft Office → Proprietary (closed-source) by Microsoft.
FreeOffice → Free to use but not open-source (by SoftMaker).
WPS Office → Free version available but proprietary (by Kingsoft).
Correct Answered:
Wrong Answered:
23. Which of the following statements best describes the difference between storage registers and main memory?
A
Storage registers are faster and located within the CPU, while main memory is slower and external to the CPU.
B
Storage registers are used for permanent data storage, while main memory is used for temporary data storage.
C
Storage registers are larger in capacity, while main memory is smaller in capacity.
D
Storage registers are used for storing files, while main memory is used for executing programs.
✅ Correct Answer: A) Storage registers are faster and located within the CPU, while main memory is slower and external to the CPU.
Correct Answered:
Wrong Answered:
24. Arrange the following programming languages in ascending order of execution speed.
A
Python, Java, C, Machine Code
B
Java, Python, C, Machine Code
C
Machine Code, C, Java, Python
D
Machine Code, Python, C, Java
| Language | Type | Relative Speed | Reason |
|---|---|---|---|
| Python | Interpreted | 🐢 Slowest | Runs via an interpreter; involves high abstraction and dynamic typing. |
| Java | Compiled to bytecode (JVM) | ⚙️ Faster than Python | Bytecode is executed by the JVM’s Just-In-Time (JIT) compiler. |
| C | Compiled | 🚀 Faster | Compiled directly to machine code; low-level access to memory. |
| Machine Code | Native binary | ⚡ Fastest | Directly executed by the CPU; no interpretation or translation needed. |
Correct Answered:
Wrong Answered:
25. The "e-NAM" platform in India is related to
A
Online booking of cinema tickets
B
Agricultural marketing
C
Online fashion retail
D
International trade
e-NAM (National Agriculture Market) is an online trading platform for agricultural commodities in India.
It helps farmers, traders, and buyers to trade in a unified national market.
Correct Answered:
Wrong Answered:
26. Total number of layers in OSI model is
A
5
B
7
C
9
D
11
The OSI (Open Systems Interconnection) model has 7 layers:
Physical
Data Link
Network
Transport
Session
Presentation
Application
Correct Answered:
Wrong Answered:
27. How many color dots make up one color pixel on a screen?
A
8
B
1080
C
3
D
265
One color pixel on a screen is made up of 3 color dots called subpixels: Red, Green, and Blue (RGB).
Correct Answered:
Wrong Answered:
28. ________gets installed and stays hidden in your computer's memory. It stays involved to the specific type of files which it infects.
A
Boot Sector Virus
B
Direct Action Virus
C
Polymorphic Virus
D
Multipartite Virus
Direct Action Virus ✅
Correct Answered:
Wrong Answered:
29. 'Ctrl+ Right Arrow' is used to
A
Move the cursor one word right
B
Move the cursor end of the line
C
Move the cursor end of the document
D
Move the cursor one paragraph down
Move the cursor one word right ✅
Correct Answered:
Wrong Answered:
30. Wireless mouse communicates through
A
radiowaves
B
wire
C
microwaves
D
electromagnetic signal
Wireless mice typically use radio waves (like Bluetooth or 2.4 GHz RF) to communicate with the computer.
Wire is not applicable because it’s wireless.
Microwaves are a type of radio wave but usually refer to higher frequencies used in communication like Wi-Fi, not typically for mice.
Electromagnetic signal is a broad term that includes radio waves, but radio waves is the more precise answer here.
Correct Answered:
Wrong Answered:
31. PNG is a
A
image format
B
file format
C
internet format
D
html format
PNG stands for Portable Network Graphics, and it is a popular image file format used for lossless compression of images.
Correct Answered:
Wrong Answered:
32. The term 'Computer' is derived from
A
Latin
B
German
C
French
D
Arabic
The term "Computer" is derived from the Latin word "computare", which means to calculate or to count.
Correct Answered:
Wrong Answered:
33. ROM contain some coding known as
A
System files
B
Data files
C
Pinching
D
BIOS
ROM (Read-Only Memory) contains firmware, which includes the BIOS (Basic Input Output System).
BIOS is essential code that helps start the computer and manage data flow between the operating system and hardware.
System files and Data files are stored on storage devices, not in ROM.
Pinching is unrelated.
Correct Answered:
Wrong Answered:
34. What is the name of non-volatile chip that stores the date, time and system configuration?
A
RAM
B
СМOS
C
JFET
D
FET
CMOS (Complementary Metal-Oxide-Semiconductor) chip stores system settings like date, time, and configuration.
It is a non-volatile memory, meaning it retains data even when the computer is turned off.
RAM is volatile memory.
JFET and FET are types of transistors, not memory chips.
Correct Answered:
Wrong Answered:
35. Which of the following statements about computer memory are correct? I. Cache memory is faster than RAM. II. SSDs are slower than HDDs. III. Virtual memory extends RAM using storage space. IV. DRAM is a type of non-volatile memory.
A
I and III only
B
II and IV only
C
I, II and III only
D
I, III, and IV only
Cache is faster than RAM, Virtual memory extends RAM. SSDs are faster than HDDs and DRAM is volatile, not non-volatile.
Correct Answered:
Wrong Answered: