Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M1 R5: Information Technology Tools and Network Basics
Networking Fundamentals
Set 16
25
See Explanation !
1
What is the full form of Nasscom ?
नैसकॉम का पूर्ण रूप क्या है?
National Association of Software and Serving Computer
National Association of Software and Server Computer
National Association of Software and Service Computer
None of these
Next Question
25
See Explanation !
2
What is the full form of USSD?
USSD का पूर्ण रूप क्या है?
Unstructured Supplementary Service Data
Unstable Supplementary Service Data
Under Supplementary Service Data
None
Previous Question
Next Question
25
See Explanation !
3
A passive threat to computer security is
कंप्यूटर सुरक्षा के लिए एक निष्क्रिय खतरा है
Malicious Intent
Sabotage
Accident Errors
Espionage Agents
Previous Question
Next Question
25
See Explanation !
4
How many digits are there in an IMEI number?
IMEI नंबर में कितने अंक होते हैं?
15
13
12
10
Previous Question
Next Question
25
See Explanation !
5
What is the full form of EDS?
EDS का पूर्ण रूप क्या है?
Electronic Data System
Electronic Data Software
Electric Data System
Electric Digit System
Previous Question
Next Question
25
See Explanation !
6
Which of the following is cyber attack?
निम्नलिखित में से कौन सा साइबर हमला है?
phishing
MiTm
Reply attack
Wire sniffing
Previous Question
Next Question
25
See Explanation !
7
Mobile phone can be tracked by which of the followings ?
मोबाइल फोन को निम्नलिखित में से किसके द्वारा ट्रैक किया जा सकता है?
SIM
GPS
Both
None
Previous Question
Next Question
25
See Explanation !
8
What is cryptography?
क्रिप्टोग्राफी क्या है?
It keeps our data safe
Converts data to secret code
It is used in email, debit card, credit card
All of the above
Previous Question
Next Question
25
See Explanation !
9
The circuit used to store one bit of data is known as
एक बिट डेटा को संग्रहीत करने के लिए उपयोग किए जाने वाले सर्किट को.......................
Register
Encoder
Decoder
Flip Flop
Previous Question
Next Question
25
See Explanation !
10
What code do IMEI numbers used?
IMEI नंबर किस कोड का उपयोग करते हैं?
*60#
$#6#
*#06#
None
Previous Question
Next Question
25
See Explanation !
11
QR Code Means ?
QR कोड का मतलब है ?
Quick Response Code
Quick Recorder Code
Quick Register Code
None of These
Previous Question
Next Question
25
See Explanation !
12
Full Form of ECB ?
ECB का पूरा रूप?
External Commercial Borrowings
Exta Commercial Borrow
External Computer Borrowings
None
Previous Question
Next Question
25
See Explanation !
13
What is the full form of ABRS?
ABRS का पूर्ण रूप क्या है?
Aadhaar Based Remittance Service
Aadhaar Board Remittance Service
Advance Based Remittance Service
None
Previous Question
Next Question
25
See Explanation !
14
Full Form of MMS ?
MMS का पूरा रूप?
multimedia messaging service
multi messaging service
multiple messaging service
multi mobile service
Previous Question
Next Question
25
See Explanation !
15
What is a good way to protect sensitive information sent via e-mail?
ई - मेल के माध्यम से भेजी गई संवेदनशील जानकारी को सुरक्षित रखने का एक अच्छा तरीका क्या है?
Write it in another language
Keep the message in attachment
Encrypt the message
Send as a blind copy
Previous Question
Next Question
25
See Explanation !
16
Which of the following is NOT considered to be malware?
निम्नलिखित में से किसे मैलवेयर नहीं माना जाता है?
viruses
spyware
worm
adware
Previous Question
Next Question
25
See Explanation !
17
Copyright law protects
कॉपीराइट कानून सुरक्षा करता है
Tangible property
Intangible property
The name of a particular good or service
Ideas contained in varied forms of expression
Previous Question
Next Question
25
See Explanation !
18
Which of the following are forms of malicious attack
निम्नलिखित में से कौन से दुर्भावनापूर्ण हमले के रूप हैं
Theft of information
Modification of data
Wiping of information
All of the mentioned
Previous Question
Next Question
25
See Explanation !
19
What are the common security threats
सामान्य सुरक्षा खतरे क्या हैं
File Shredding
File sharing and permission
File corrupting
File integrity
Previous Question
Next Question
25
See Explanation !
20
From the following, which is not a common file permission
निम्नलिखित में से, जो सामान्य फ़ाइल अनुमति नहीं है
Write
Execute
Stop
Read
Previous Question
Next Question
25
See Explanation !
21
Which of the following is a good practice
निम्नलिखित में से कौन सा एक अच्छा अभ्यास है
Give full permission for remote transferring
Grant read only permission
Grant limited permission to specified account
Give both read and write permission but not execute
Previous Question
Next Question
25
See Explanation !
22
Which of the following is a strong password
निम्नलिखित में से कौन सा एक मजबूत पासवर्ड है
19thAugust88
Delhi88
P@assw0rd
!augustdelhi
Previous Question
Next Question
25
See Explanation !
23
Why is a one time password system considered more secure than a basic authentication system?
एक बार की पासवर्ड प्रणाली को बुनियादी प्रमाणीकरण प्रणाली की तुलना में अधिक सुरक्षित क्यों माना जाता है?
It is easy to generated
It cannot be shared
It is different for every access
It is a complex encrypted password
Previous Question
Next Question
25
See Explanation !
24
Which happens first authorization or authentication
जो पहले प्राधिकरण या प्रमाणीकरण होता है
Authorization
Authentication
Authorization & Authentication are same
None of the mentioned
Previous Question
Next Question
25
See Explanation !
25
Which day is celebrated as world Computer Literacy Day?
किस दिन को विश्व कंप्यूटर साक्षरता दिवस के रूप में मनाया जाता है?
December 2
November 2
December 12
November 12
Previous Question