UGC NET Paper 1 — Computer Science
582 questions across 12 years
Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.
By year
By topic
Practice questions
50 questions shown from 2024.
एम टेक (कंप्यूटर विज्ञान) के विद्यार्थी का वर्ष 2023 में प्रदत्त औसत मासिका वेतन वर्ष 2022 की अपेक्षा लगभग ______ % अधिक हैं।
What is the base-10 equivalent of the base-4 number 3013?
If (L)M represents a number L in base -M number system, then which of the following equalities are true? Α. (512.125)10 = (1000000000.001)2 Β. (512.125)10 = (1000.1)8 C. (512.125)1...
Identify the correct order of the following list of computer components ranked from slowest to fastest in terms of access time.
Identify the correct order of the following list of computer components ranked from slowest to fastest access time.
A webpage displays the following information, in which underlined word is a link to another webpage. For digital devices, the bandwidth is usually expressed in bits per second (bps...
Around 1945, who developed the idea of a stored program computer that was to hold programs and data in a memory and then data would move between the memory and the processor?
Which of the following statements about computer memories is correct?
What is the contribution of Douglas Engelbart in the evolution of computer?
In computing, which of the following is a program downloaded and installed on a computer that appears harmless, but is in fact, malicious.
If (L)M represents a number L in base-M number system, then what will be the value of (107)16+(257)16?
Which of the following electronic technologies is the key technology for making the Personal Computer (PC) in the 1970s ?
A security system uses a camera to capture an image of each person entering a gift shop. Each captured image requires 1 MB of storage. If the camera captures an image every 5 secon...
Mobile games were the first to popularize ________ which uses an image of an actual place or thing and adds digital information to it.
Consider the following snapshot of MS-Excel worksheet: In cell D18, the value returned by the function. =SUMIFS (C18: C23, B18: B23, ">3", C18: C23, ">500") is
Which of the following electronic technologies is the key technology for making the fourth generation electronic computer?
Which of the following electronic technologies is the key technology for making the third generation electronic computer?
Computer security breaches can be minimized by incorporating which feature into a computer system's operation?
With reference to different number systems, which of the following statements is true?
Which of the following pair of acronyms and their expansion is incorrectly matched?
Key-logger, which is an abbreviation for key-stroke-logger, is a type of cyber threat. Key-logger is a form of which of the following?
In computer networking, an IP version-6 is ________ times larger than an IP version-4 address.
Which of the following pair of acronyms and their expansion is incorrectly matched ?
A webpage displays the following information, in which underlined word is a link to another webpage. For digital devices, the bandwidth is usually expressed in bits per second (bps...
In the context of Computer Networks, which of the following best describes the transmission of a message using packet switching?
In the context of computer networking, which of the following best describes the transmission of a message using packet switching?
Which of the following would create the most stable computer network with the fastest data transmission?
Microsoft Access is an example of a(n) _________.
Which of the following best describes message transmission using packet switching in the context of computer networks?
Which of the following pair of acronym and its expansion is incorrectly matched ?
An Internet standard that allows for adding media attachments to an email is called :
Which of the following statements is true about Number system?
If (L)M represents a number L in base M number system, then identify the correct descending order of the following number A-D, when converted to base-10 number system. (A) (9C)16 (...
Which of the following statements is correct regarding the number system?
Identify the sequence of words A-E that correctly fills the blanks in the following paragraph: In the context of human-computer interaction, a _________ is an interface built aroun...
Match List - I with List - II. List - I (Malware) (A) Ransomware (B) Spyware (C) Worm (D) Trojan Horses List - II (Definition) (I) Software that monitors and/or records the actions...
Identify the correct order of the following storage devices A-D as per their increasing data storage capacity: (A) DVD (B) Hard Disk (C) CDROM (D) Blu-Ray Disk Choose the correct a...
Identify the correct order of the following computer storage capacities A-E from largest to smallest capaity (1 K= 1024) A. 1000000 K Bytes B. 100000 M Bytes C. 1 T Bytes D. 100000...
Identify the correct order of the following major technological changes A-D in the development of computers based on first to fourth generation of computers: (A) Transistors (B) Mi...
Identify the correct ascending order of the following four types of computer networks A-D based on their coverage area: (A) WAN (B) LAN (C) MAN (D) PAN Choose the correct answer fr...
In the context of Bluetooth and Wi-Fi as wireless communication technologies, which of the following statements are true? A. Bluetooth allows for short-range data transfer between...
Identify the sequence of words A-E that correctly fills the blanks in the following paragraph: __________ is small amount of memory located on the CPU itself. __________ is a form...
In cyber world, Black Hat Hackers are individuals with extra-ordinary computing skills who use these skills with malicious intent. In this context, identify the correct order for a...
Identify the sequence of words A-E that correctly fills the blanks in the following paragraph on computer networking:? IPv4 addresses are ________ long, and IPv6 addresses are ____...
Match the List-I with List-II LIST I (File Extension) A. dox B. jpg C. mp3 D. mov LIST II (File Type) I. Image file II. Video file III. MS-WORD file IV. Audio file Choose the corre...
On the basis of the coverage area, identify the correct ascending order of the following four types of computer networks A-D: (A) WAN (B) LAN (C) MAN (D) PAN Choose the correct ans...
Identify the correct logical sequence of the following four randomly-ordered sentences A - D about the discovery of Computer Mouse? A. We use the mouse today because it is the poin...
To record voice narration for your Microsoft PowerPoint presentation, your computer must have: (A) Sound card (B) An internet connection (C) Speakers (D) An external video port (E)...
With reference to computer components, which of the following statements are correct? (A) A hard drive has no moving parts. (B) Fan is required to cool down CPUs so that these do n...
Which of the following are examples of system software?