UGC NET Paper 2 — ICT
147 questions across 3 years
Public preview: answer keys and topic tags are available on many questions, while original explanations are being added selectively. Use the filters below for cleaner practice.
By year
Practice questions
24 questions shown from 2024.
What is the base-10 equivalent of the base-4 number 3013?
Identify the correct order of the following list of computer components ranked from slowest to fastest in terms of access time.
Identify the correct sequence of the emergence of the following concepts. A. Virtual Communities B. Cyber Culture C. Being Digital D. Tele Computer E. Interactive Media Culture Cho...
A keylogger, short for Keystroke logger, is type of cyber threat. Keyloggers are a form of ________.
Identify the sequence of words A-E that correctly fills the blanks in the following paragraph : __________ is used to connect the smartwatch and wireless headphone to the phone and...
निम्नलिखित में से कौन से इंटरनेट के अधिक प्रयोग से संबंधित हैं ? A. व्यसन B. अवसाद C. विकर्षण D. कणीकरण E. जनसंचार माध्यम (मीडिया) का ज्ञान नीचे दिए गए विकल्पों में से सही उत्तर का...
Which of the following digital initiatives provides database of profiles of scientists / researchers and other faculty members working at leading academic institutions and R & D or...
Which of the following statements A-D about computer memory size is/are true? A. 25 KB is larger than 100 MB. B. 999 MB is larger than 50 GB. C. 3500 KB is smaller than 2 GB. D. 23...
Match List - I with List - II. List - I (Internet Protocol) A. HTTP B. SSL C. SMTP D. FTP List - II (Internet Activity) I. Sends email through the Internet II. Encrypts data for on...
Computer security breaches can be minimized by incorporating which feature into a computer system's operation ?
Consider the following snapshot of MS-EXCEL worksheet: What will be the value of the cell C1 containing the formula =SUMIF(A1:A6,">100",B1:B6) in the above worksheet?
Which of the following software titles are examples of system software? A. Ubuntu B. Google Docs C. MS-Office 365 D. Android E. Chrome OS Choose the correct answer from the options...
A sociology professor wants to gather student's opinions on controversial social issue discussed in class which tools allow the professor to create polls and analyze responses in r...
Which of the following are correct in the context of Artificial Intelligence as one of the innovations in evolution system? A. It is a software system used for automated scoring B....
Microsoft PowerPoint comes with several categories of built-in transition effects. Which of the following is not a type of transition effect supported by Microsoft PowerPoint?
Match List - I with List - II. List - I (Internet Term) (A) Blogs (B) Podcasts (C) Tagging (D) Wikis List - II (Description) (I) Allows users to create and edit web pages using a b...
Many websites require the following to be completed : I'm not a robot. This is an example of which data issue?
Match List - I with List - II. List - I (Digital Initiative) A. Shodh Sindhu B. Shodh Gangotri C. Shodh Shuddhi D. FOSSEE List - II (Purpose) I. Hosts synopsis of research topics i...
Match the List-I with List-II LIST I Tool/ Softwares A. Plotagon B. Mindmeister C. Github D. Mentimeter LIST II Applications I. To create Pre-and-post-session polls to gauge studen...
What are the advantages of using Cloud Computing word processing software ? (A) The user does not have to install word processing software on the computer. (B) The user does not ha...
कंप्यूटर नेटवर्किंग के सन्दर्भ में, पैकेट स्विचिंग के प्रयोग से सन्देश प्रेषण का निम्न में से कौन सर्वोत्तम वर्णन करता हैं ?
If (L)M represents a number L in base-M number system, then what will be the value of (107)16+(257)16?
The authentication to be affected by use of asymmetric crypto system and hash function is known as:
Which is not an academic search engine ?