Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M1 R5: Information Technology Tools and Network Basics
Networking Fundamentals
Set 23
25
See Explanation !
1
Which programming language is commonly used for developing RPA bots?
RPA बॉट विकसित करने के लिए आमतौर पर किस प्रोग्रामिंग भाषा का उपयोग किया जाता है?
Java
Python
C++
Visual Basic for Applications (VBA)
Next Question
25
See Explanation !
2
Which of the following is NOT a common cybersecurity threat?
निम्नलिखित में से कौन सा एक सामान्य साइबर सुरक्षा खतरा नहीं है?
Phishing
Ransomware
Firewall
Malware
Previous Question
Next Question
25
See Explanation !
3
What is malware?
मैलवेयर क्या है?
A type of computer hardware
A type of computer virus
A security protocol
A programming language
Previous Question
Next Question
25
See Explanation !
4
Which cybersecurity measure encrypts data to protect it from unauthorized access?
कौन सा साइबर सुरक्षा उपाय डेटा को अनधिकृत पहुंच से बचाने के लिए एन्क्रिप्ट करता है?
Firewall
Antivirus software
Encryption
Intrusion detection system (IDS)
Previous Question
Next Question
25
See Explanation !
5
What is a firewall in the context of cybersecurity?
साइबर सुरक्षा के संदर्भ में फ़ायरवॉल क्या है?
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A social media platform
Previous Question
Next Question
25
See Explanation !
6
What is two-factor authentication (2FA)?
टू - फैक्टर ऑथेंटिकेशन (2FA) क्या है?
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A programming language
Previous Question
Next Question
25
See Explanation !
7
Which cybersecurity measure protects against malicious software by scanning and removing or quarantining it?
कौन सा साइबर सुरक्षा उपाय दुर्भावनापूर्ण सॉफ़्टवेयर को स्कैन करके और उसे हटाकर या क्वारंटाइन करके उसकी सुरक्षा करता है?
Firewall
Encryption
Antivirus software
Phishing
Previous Question
Next Question
25
See Explanation !
8
An endpoint of an inter-process communication flow across a computer network is
कंप्यूटर नेटवर्क में इंटर - प्रोसेस कम्युनिकेशन फ्लो का एक एंडपॉइंट है
Socket
Pipe
Port
Machine
Previous Question
Next Question
25
See Explanation !
9
Who was the first to use the term Big Data?
बिग डेटा शब्द का उपयोग सबसे पहले किसने किया था?
Steve Jobs
Bill Gates
John Mashey
John Bredi
Previous Question
Next Question
25
See Explanation !
10
Artificial Intelligence is about
आर्टिफिशियल इंटेलिजेंस के बारे में है
Playing a game on Computer.
Making a machine Intelligent.
Programming on Machine with your Own Intelligence.
Putting your intelligence in Machine
Previous Question
Next Question
25
See Explanation !
11
Who is known as the Father of AI?
AI के पिता के रूप में किसे जाना जाता है?
Fisher Ada
Alan Turing
John McCarthy
Allen Newell
Previous Question
Next Question
25
See Explanation !
12
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
निम्नलिखित में से किसको कंप्यूटर सिस्टम, नेटवर्क या उनकी संबंधित जानकारी को चोरी करने, जासूसी करने, नुकसान पहुंचाने या नष्ट करने के प्रयास के रूप में परिभाषित किया गया है?
Cyber attack
Computer security
Cryptography
Digital hacking
Previous Question
Next Question
25
See Explanation !
13
Which of the following is not an objective of network security?
निम्नलिखित में से कौन नेटवर्क सुरक्षा का उद्देश्य नहीं है?
Confidentiality
Integrity
Availability
Hacking
Previous Question
Next Question
25
See Explanation !
14
What is the main purpose of a firewall in network security?
नेटवर्क सुरक्षा में फ़ायरवॉल का मुख्य उद्देश्य क्या है?
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
Previous Question
Next Question
25
See Explanation !
15
What is phishing in terms of cybersecurity?
साइबर सुरक्षा के मामले में फ़िशिंग क्या है?
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Previous Question
Next Question
25
See Explanation !
16
Which of the following is NOT an example of cloud storage?
इनमें से कौन सा क्लाउड स्टोरेज का उदाहरण नहीं है?
Google Drive
Dropbox
OneDrive
USB Flash Drive
Previous Question
Next Question
25
See Explanation !
17
In networking, what does VPN stand for?
नेटवर्किंग में, वीपीएन का क्या अर्थ है?
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Previous Question
Next Question
25
See Explanation !
18
Which of the following is a type of artificial intelligence?
निम्नलिखित में से कौन सा आर्टिफिशियल इंटेलिजेंस का एक प्रकार है?
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Previous Question
Next Question
25
See Explanation !
19
What does SaaS stand for in cloud computing
क्लाउड कंप्यूटिंग में SaaS का क्या मतलब है
System as a Service
Software as a Solution
Software as a Service
Solution as a System
Previous Question
Next Question
25
See Explanation !
20
Which of the following is an example of an operating system?
निम्नलिखित में से कौन एक ऑपरेटिंग सिस्टम का एक उदाहरण है?
MS Excel
Adobe Photoshop
Windows
Google Chrome
Previous Question
Next Question
25
See Explanation !
21
What does URL stand for?
URL का क्या मतलब है?
Uniform Resource Link
Uniform Resource Locator
Unified Routing Line
Universal Resource Label
Previous Question
Next Question
25
See Explanation !
22
Which of the following is used to uniquely identify a device on a network?
नेटवर्क पर किसी डिवाइस को विशिष्ट रूप से पहचानने के लिए निम्नलिखित में से किसका उपयोग किया जाता है?
Gateway
IP Address
Subnet Mask
MAC Address
Previous Question
Next Question
25
See Explanation !
23
Which of the following is a strong password?
निम्नलिखित में से कौन सा एक मजबूत पासवर्ड है?
password123
12345678
abcDEFgh
8Gh#4Lp@1
Previous Question
Next Question
25
See Explanation !
24
Which of the following is NOT a programming language?
निम्नलिखित में से कौन सी प्रोग्रामिंग भाषा नहीं है?
Python
Java
MS Word
C++
Previous Question
Next Question
25
See Explanation !
25
Which device is required to connect a computer to a network?
कंप्यूटर को नेटवर्क से कनेक्ट करने के लिए किस डिवाइस की आवश्यकता होती है?
RAM
CPU
Hard Drive
Network Interface Card (NIC)
Previous Question