UGC NET Paper 1 — ICT
847 questions across 12 years
Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.
By year
By topic
Match List - I with List - II. List-I (Use) A. To input voiceovers for a presentation B. To input a PIN C. To select options from a menu D. To operate a flight simulator List-II (A...
A device used to convert a computer's digital signal to an analogue signal for communication is called a:
Which of the following statements A-D about computer memory size is/are true? A. 25 KB is larger than 100 MB. B. 999 MB is larger than 50 GB. C. 3500 KB is smaller than 2 GB. D. 23...
What is the base-10 equivalent of the base-4 number 3013?
USB stands for ____________.
Which of the following pair of acronym and its expansion is incorrectly matched? (1) FTP - File Transfer Protocol (2) SMTP - Simple Mail Technology Protocol (3) UDP - User Datagram...
A person who uses his expertise to gain access to other people's computers to get information illegally or to cause damage, is a
The smallest unit of information, a computer can understand and process is known as:
Which of the following pair of acronym and its expansion is incorrectly matched? 1. CPU - Central Processing Unit 2. UPS - Uninterruptible Power Software 3. DVD - Digital Versatile...
Given below are two statements : one is labelled as Assertion (A) and the other is labelled as Reason (R). Assertion (A): Search Engine is a hardware device that searches for any w...
Match List - I with List - II. List - I A. Phishing B. Pharming C. Spyware D. Virus List - II I. Malicious code installed on a user's computer or a web server II. Creator sends out...
Match List - I with List - II. List - I A. Phishing B. Hacking C. Spam D. Cookies List - II I. Act of gaining unauthorized access II. Unsolicited email sent over the internet to a...
Which of the following made a significant contribution to growth of ICT usage ? A. exponential progress of the semiconductor technology paving the way for low-cost hardware. B. int...
Match List-I with List-II: List-I (Digital Initiative) A. SAKSHAT B. IRINS C. UMANG D. FOSSEE List-II (Distribution) I. Single point of access to all government services II. Reduce...
Match List - I with List - II. List - I (Digital Initiative) A. SAKSHAT B. IRINS C. UMANG D. FOSSEE List - II (Description) I. Single point of access to all Government services II....
Which of the following programmes/software can be used for quantitative data analysis?
Arrange the following digital initiatives (programs) of the Government of India in chronological order based on the year of their re-establishment.
What is the full form of ARPANET?
Which of the following is not a communication technology?
Which one of the following is not a social networking site?
Which of the following is not a social networking site?
Match List I with List - II : List - I A. Social media B. Website C. E-mail D. SMS List - II I. Method of sending longer messages along with attachment(s) via internet II. A method...
Match List - I with List - II. List - I A. Social Media B. Website C. E-mail D. SMS List - II I. A method of sending long messages over the internet to which attachments can be add...
HTTP stands for _________.
निम्नलिखित में से किसका सम्बन्ध नेटवर्क सेक्योरिटी से है?
Which is NOT a valid file format for images?
In __________, each communicating device is connected with every other device in the computer network.
Which of the following is related to network security?
Which of the following is an example of IEEE 802.3 ?
Which of the following is correct physical address of a computer?
www.ncert.nic.in in the following web address is called ________. http://www.ncert.nic.in/textbook/textbook.htm
Identify the sequence of appropriate words A-D that correctly fills the blanks in the following paragraph: Radio ________ Identification Systems use radio waves to read and capture...
Which of the following statements are correct in the context of cyber attacks? A. Malware is malicious software designed to damage a single computer, server or computer network. B....
Match List - I with List - II: List - I (Operating system) A. UNIX B. MS-DOS C. Android OS D. Utility programs List - II (Task) I. Assist users in system maintenance task II. Mobil...
Match the LIST-I with LIST-II LIST-I (Electronic Device) A. Wireless mouse B. Optical mouse C. Liquid Crystal Display D. Optical Character Reader LIST-II (Properties) I. Reading of...
A standard address format that constitutes a reference to an internet resource is :
PSTN stands for:
An IP address consists of a:
एक आईपी एड्रेस में होते हैं :
CD-ROM stands for:
VPN stands for:
असत्य कथनों का चयन करें : A. 'सीडी' प्रकाशिक युक्ति का उदाहरण है B. 'फ्लॉपी' चुंबकीय युक्ति का उदाहरण है C. 'पेनड्राइव' चुंबकीय अवस्था युक्ति का उदाहरण है D. "मेमोरी कार्ड" क्रिस्ट...
Choose the correct statements: A. Cisco is a hockey manufacturer. B. VLC is Visible Light Communication. C. SDN stands for System in Digital Network. D. Hypercat is an open JSON-ba...
Choose the 'WRONG' statement. A. 'JPEG' stands for Joint Photographic Exchange General B. 'FTP' stands for File Transfer Protocol C. 'GUI' stands for General User Interface D. 'FAT...
Choose the 'RIGHT' statements: A. IoT term was first used by Ashton in context to supply chain management with RFID-tags B. Bluetooth 4.0 is working on the frequency range of 2.4 M...
Choose the incorrect statements:
Choose the 'incorrect' statement: A. 'Bit' is a unit of storage. B. 'Micron' is a unit of weight. C. 'F-13' is a functional button on the computer keyboard. D. Pixel is related to...
Match List - I with List - II : List - I (Item) A. Yahoo B. Firefox C. Solitaire D. Quillbot List - II (Category) I. Web-browser II. AI based paraphrasing tool III. Search engine I...
Match List I with List - II : List - I (Output device) A. CRT monitor B. Flat-Panel monitor C. Printer D. Projector List - II (Function) I. Uses a LCD screen to display output II....
Match List - I with List - II: List - I (Item) A. Yahoo B. Firefox C. Solitaire D. QuillBot List - II (Category) I. Web Browser II. AI-based paraphrasing tool III. Search Engine IV...