UGC NET Paper 1 — Computer Science
582 questions across 12 years
Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.
By year
By topic
Practice questions
31 questions shown from 2026.
अवैध रूप से सूचना प्राप्त करने अथवा क्षति पहुंचाने के लिए अपनी विशेषज्ञता का प्रयोग कर दूसरों के कंप्यूटरों तक पहुंच प्राप्त करने वाला व्यक्ति क्या कहलाता है?
Identify the correct logical sequence for programming: A. Compilation B. Editing C. Linking D. Execution Choose the correct answer from the options given below:
Which of the following technology was introduced in the development of third generation of computers ?
सूचना की वह लघुत्तम यूनिट निम्न में से किस रूप में ज्ञात होती है जिसे कंप्यूटर समझ सकता है और उसका प्रक्रमण कर सकता है ?
Which of the following fall in the category of primary memory ? A. ROM B. RAM C. Cache D. HDD E. SSD Choose the correct answer from the options given below :
Which of the following is NOT a programming language?
Which of the following is related to computer software?
Which term is NOT related to computer hardware ?
Given below are two statements: one is labelled as Assertion A and the other is labelled as Reason R Assertion A: Random Access Memory (RAM) is a volatile memory. Reason R: RAM doe...
Given below are two statements: one is labelled as Assertion (A) and the other is labelled as Reason (R). Assertion (A): VoIP is an acronym that stands for Voice over Internet Prot...
नीचे दो कथन दिए गए हैं: एक अभिकथन (A) के रूप में लिखित है तो दूसरा उसके कारण (R) के रूप में है। अभिकथन (A) : वीओआईपी (VoIP) एक प्रथमाक्षर है जिसका पूर्ण रूप वायस ओवर इंटरनेट प्रोटो...
Match the LIST-I with LIST-II LIST-I A. Simplex B. Serial C. Full-duplex D. Parallel LIST-II I. Multiple bits transmitted over several channels at the same time II. Data transmissi...
Identify the correct sequence of steps A-D followed by the CPU as it processes each instruction in a program. A. Store B. Decode C. Fetch D. Execute Choose the correct answer from...
If (L)M represents a number L in base-M number system, then identify the correct descending order of the following numbers A-D when converted to decimal number system. A. (20003.2)...
Identify the correct sequence of the following steps A-D followed by the CPU in processing each instruction in a program: A. Store B. Decode C. Fetch D. Execute Choose the correct...
If (L)M represents a number L in base - M number system, then identify the correct descending order of the following numbers A-D when converted to decimal number system. A. (103.2)...
Match the LIST-I with LIST-II LIST-I A. Keyboard B. Monitor C. CPU D. ROM LIST-II I. Memory II. Processor III. Output device IV. Input device Choose the correct answer from the opt...
If the base M number system represents the number L as (L)M, then which of the following numbers are equivalent to (AD)16?
Which of the following memories/storage are volatile? A. RAM B. ROM C. Cache D. SSD E. HDD Choose the correct answer from the options given below:
Which of the following computer devices A-E are computer networking devices only? A. CD-RW B. Hub C. Hard Disk D. Switch E. Router Choose the correct answer from the options given...
Which term is not related to computer hardware ?
If (L)M represents a number L is base-M number system, then which of the following numbers are equivalent to (AD)16? A. (255)8 B. (10101101)2 C. (173)10 D. (1141)5 Choose the corre...
Which of the following are system software? A. Compiler B. Word Processor C. Interpreter D. Linker E. Assembler Choose the correct answer from the options given below:
Which of the following are application software?
Arrange the following in ascending order of size: A. Mini Computer B. Notebook Computer C. Desktop Computer D. Tablet Choose the correct answer from the options given below:
Arrange the following in increasing order in terms of their coverage: A. PAN B. MAN C. WAN D. LAN Choose the correct answer from the options given below :
Match List - I with List - II. List - I (Task) A. Producing a letter to send out to patients B. Creating graphs to show number of people attending the health centre C. Creating que...
Arrange the following operating systems in correct chronological order of their development A. Linux B. MS-DOS C. MAC OS D. Windows Choose the correct answer from the options given...
Which aspect of security ensures that information has not been altered by an unauthorized person?
Which aspect of security ensures that information is not altered by any unauthorised person?
Match the LIST-I with LIST-II in the context of MS-Excel: LIST-I (Cell Reference) A. $E$5 B. E$5 C. E5 D. $E5 LIST-II (Definition and Feature) I. Absolute reference. Column and row...