*New* Model Set for Practice
Model Set 1
1. Which of these is an example of system software?
Database
Operating System
Spreadsheet
Word Processor
2. The primary device that a computer uses to store information is the:
SSD
CPU
GPU
Motherboard
3. What is the smallest unit of data in a computer?
Byte
Kilobyte
Bit
Megabyte
4. Which technology is used to make telephone calls over the Internet possible?
Bluetooth
Ethernet
NFC
VoIP
5. What type of computer could be primarily used to coordinate other computers in a network?
Supercomputer
Desktop
Server
Tablet
6. Which of these storage devices has the highest storage capacity?
DVD
Blu-ray Disc
CD-ROM
Floppy Disk
7. Which component connects the processor to the rest of the computer system?
Power supply
Motherboard
Cooling fan
Hard drive
8. Which protocol provides error-free communication between end devices?
IP
TCP
UDP
ICMP
9. What is the function of DNS in networking?
It translates domain names into IP addresses.
It encrypts network traffic.
It distributes IP addresses.
It routes data between networks.
10. Which device is used to connect multiple networks and determine the optimal path for network traffic?
Hub
Switch
Router
Modem
11. What is a firewall in computer network security?
A physical barrier for network access
Malware scanning software
A system designed to prevent unauthorized access
A backup utility
12. Convert the hexadecimal number "1A3E" to binary.
1101000111110
11010111001110
101000111110
1101011101110
13. Which of the following statements is true about compilers?
Compilers convert code from low-level language to high-level language.
Compilers convert the entire program at one time.
Compilers convert programs line by line.
Compilers are not needed for interpreted languages.
14. Convert the postfix expression "AB+C*D-" to infix.
(A + B) * C - D
A + (B * C) - D
A + B * (C - D)
(A + B) * (C - D)
15. In a flowchart, what does a parallelogram typically represent?
Start/End
Input/Output
Processing
Decision
16. In MS Excel, how do you freeze a row?
Home > Freeze Panes > Freeze Top Row
View > Window > Freeze Panes
Layout > Freeze Panes > Freeze First Column
Insert > Freeze Panes
17. In MS Word, which feature allows you to insert a watermark?
Review
Design
Layout
References
18. Which SQL command is used to fetch all columns from a table named 'Employees'?
SELECT * FROM Employees
FETCH * FROM Employees
GET * FROM Employees
READ * FROM Employees
19. Which command in Linux is used to view the content of a file?
Is
cat
touch
rm
20. In object-oriented programming, which concept is used to hide the internal implementation of an object?
Encapsulation
Inheritance
Polymorphism
Abstraction
21. Which HTML element is used to define important text?
<strong>
<bold>
<important>
<em>
22. The difference between the SEARCH and FIND function is –
The FIND function is case sensitive and the SEARCH function is not.
The SEARCH function is case sensitive and the FIND function is not.
There is no difference between them, only for compatibility, both are listed.
None of these.
23. In Excel, the shortcut key Ctrl + D will
Apply double underline for the active cell
Fill down in the selection
Open the font dialog box
None of these
24. What is the meaning of ######?
The cell is not wide enough.
The cell has the wrong data.
You've entered a number wrong.
You've misspelled something.
25. What type of device is a modem?
Input
Output
Storage
Communication
26. What is the purpose of software testing?
To ensure that software meets customer requirements
To write code efficiently
To design user interfaces
To maintain hardware resources
27. Which of the following is NOT a characteristic of a RISC (Reduced Instruction Set Computer) architecture?
Large instruction set
Simple instructions
Single clock cycle execution
Pipelining
28. In the context of computer architecture, what does the term "pipelining" refer to?
The process of converting analog signals to digital signals
The simultaneous execution of multiple instructions in different stages
The arrangement of memory modules in a hierarchical structure
The encoding of instructions into machine language
29. In Microsoft Word, what is the function of the "Mail Merge" feature?
To send emails directly from Word
To combine a document with a data source to create personalized documents
To track changes made to a document
To create forms for collecting data
30. Which feature in Microsoft PowerPoint allows you to record narration and timings for a presentation?
Presenter View
Slide Show View
Record Slide Show
Animation Pane
31. To find and replace text in MS Word:
i) Go to the 'Home' tab
ii) Click on 'Replace' in the Editing group
iii) Enter the text to find and the replacement text
iv) Click 'Replace All' or 'Replace' to make changes one at a time
Select the correct order:
i > ii > iii > iv
ii > iii > iv > i
iii > iv > ii > i
iv > iii > ii > i
32. Given the following C code, which statement is correct?
int x = 0, y = 10;
if (x > 0)
if (y > 0)
printf("Both positive\n");
else
printf("x is not positive\n");
Select correct Options:
The code prints "Both positive" if both x and y are greater than 0.
The code prints "x is not positive" if x is not greater than 0.
The code has an unreachable 'else' statement.
There is no output when x is 0 or less.
33. Method to create a new database in Access:
i. Click on 'File' and select 'New'.
ii. Select 'Blank database'.
iii. Enter the file name and click 'Create'.
Select the correct order:
iii > ii > i
ii > iii > i
i > ii > iii
ii > i > iii
34. You work as a data analyst for a marketing company. Your team has been tasked with analyzing sales data for the past year to identify trends and make recommendations for future marketing strategies. The sales data is provided in an Excel spreadsheet named "SalesData.xlsx".
Based on the provided scenario, which Excel feature would you use to import the "SalesData.xlsx" spreadsheet into Excel for analysis?
Pivot Table
Data Validation
Power Query
Conditional Formatting
35. You are working as a database administrator for a retail company. The company maintains a database to store information about products, customers, and orders. You have been tasked with inserting new records into the database tables based on specific scenarios.
The company has introduced a new product named "SmartWatch Pro" into its product line. The details of the product are as follows:
Product ID: 101
Product Name: SmartWatch Pro
Category: Electronics
Price: $199.99
Stock Quantity: 100
Which SQL query would you use to insert this new product into the "Products" table?
INSERT INTO Products (ProductID, ProductName, Category, Price, StockQuantity) VALUES (101, 'SmartWatch Pro', 'Electronics', 199.99, 100);
INSERT INTO Products VALUES (101, 'SmartWatch Pro', 'Electronics', 199.99, 100);
INSERT INTO Products (ProductName, Category, Price, StockQuantity) VALUES ('SmartWatch Pro', 'Electronics', 199.99, 100);
INSERT INTO Products (ProductName, Category, Price, StockQuantity) VALUES ('SmartWatch Pro', 'Electronics', '$199.99', '100');
36. You are a network administrator responsible for managing the network infrastructure of a medium-sized company. Below are several scenarios where you need to make decisions regarding network configurations and troubleshooting.
Your company recently expanded its office space, and you need to set up a new network for the additional area. The new network will require wired and wireless connectivity for desktop computers, laptops, and mobile devices. Which network device would you primarily use to provide wireless connectivity to these devices?
Router
Switch
Access Point (AP)
Modem
37. If a Windows computer is unable to boot, which tool is most appropriate to use first?
Device Manager
Windows Update
System Restore
Disk Cleanup
38. You are designing a system to manage different types of vehicles in a transportation company. Each vehicle has common properties like make, model, and year, but they also have specific behaviors (e.g., cars can accelerate, trucks can haul cargo). Which OOP principle would you apply to ensure that the system is flexible enough to accommodate new types of vehicles in the future?
Select correct Options:
Encapsulation
Inheritance
Polymorphism
Abstraction
39. A company's software system needs to track the history of commands executed so that it can undo actions in the reverse order of execution. Which data structure would best serve this requirement?
Select correct Options:
Stack
Queue
Deque
Linked List
40. During peak operation times, users complain that their database applications slow down dramatically. The system administrator needs to optimize CPU scheduling.
Which CPU scheduling algorithm could best improve performance for a highly interactive database application during peak times?
Select correct Options:
Shortest Job First
Round Robin
Priority Scheduling
Multilevel Queue Scheduling
Model Set-2
1. Which component is responsible for executing instructions of a computer system?
Hard Drive
RAM
CPU
GPU
2. What type of storage is an SSD?
Magnetic
Optical
Flash
Online
3. The process of starting a computer is called?
Execution
Booting
Programming
Closure
4. What does "Simplex" refer to in networking?
Transmission of data in both directions simultaneously
Transmission of data in one direction only
Transmission of data in both directions, but not simultaneously
Transmission of data with high-speed connections
5. In computing, what does ROM stand for?
Read Only Memory
Random Operational Memory
Read Optional Memory
Random Only Memory
6. Which unit is an output device?
Mouse
Keyboard
Monitor
Scanner
7. Which of the following is a volatile memory?
SSD
HDD
DVD
RAM
8. Which of these operating systems is NOT based on the Linux kernel?
Ubuntu
Fedora
Android
macOS
9. What does the term 'bit' stand for in computing?
Binary Digit
Bitrate Reduction
Binary Data
Bistable Digit
10. Which is a feature of the FAT32 file system compared to NTFS?
Higher security features
Larger file size support
Support for larger disks
Less efficient with large disks
11. Which attribute specifies the path to the image?
href
link
src
All of the above
12. Which protocol is used to assign IP addresses automatically?
ARP
DHCP
ICMP
SNMP
13. Which device forwards data packets between computer networks?
Switch
Hub
Modem
Router
14. 12. In a WLAN, what does the acronym WEP stand for?
Wireless Encryption Protocol
Wired Equivalent Privacy
Wireless Encrypted Protection
Wired Encryption Privacy
15. What layer of the OSI model ensures reliable data delivery with error checking and flow control?
Transport
Network
Data Link
Physical
16. Shortcut to start the presentation from the current slide is :
F5
F4
Shift+F5
Shift+F4
17. Convert decimal 125 to hexadecimal.
7C
7D
7E
7F
18. What is the main difference between an assembler and a compiler?
An assembler translates source code, a compiler translates machine code.
A compiler translates high-level language to machine code, an assembler translates assembly language to machine code.
An assembler translates to binary, a compiler to hexadecimal.
An assembler and a compiler do the same job.
19. Convert the infix expression AB+C to postfix.
ABC+
ABC*+
AB+C
A+BC
20. What is typically the first step in the process of creating an algorithm?
Coding the algorithm
Analyzing the problem
Writing pseudocode
Testing the program
21. In MS Excel, which function finds the highest number in a range of cells?
AVERAGE
COUNT
MAX
SUM
22. How do you track changes in an MS Word document?
Review > Track Changes
Insert > Comments
File > Options
View > Markup
23. What feature in PowerPoint can you use to create dynamic slide shows?
Animations
Slide Master
Transitions
Templates
24. Which of the following is not a component of Microsoft Office Suite?
Access
Outlook
Publisher
Adobe Reader
25. In MS Access, which data type would you select for a field that stores web addresses?
Text
Hyperlink
Memo
Object
26. Notepad supports which of the following features?
Text formatting
Image insertion
Macro recording
None of the above
27. What is refactoring in software engineering?
Redesigning a system to be faster
Changing software to improve structure without changing behaviour
Fixing bugs in software
Adding new features to software
28. In DBMS, SQL stands for?
Structured Query Language
Simple Query List
Sequential Query Language
Secure Query Line
29. 27. In Linux, how do you check the permissions of a file?
check
ls -l
perm
view
30. In object-oriented programming, encapsulation refers to:
The inclusion of all methods and data inside a class
The ability of a class to derive attributes from another class
The interface between two classes
Protecting the internal state of an object from unintended or harmful modifications
31. A database administrator needs to ensure that no unauthorized user can access sensitive salary information stored in a database. Which of the following is the best method to ensure data security?
Data Masking
Data Encryption
Implementing Views
Using Strong Passwords
32. A company is experiencing intermittent network outages, and the IT department suspects there is an issue with IP address conflicts. What network tool can be used to identify IP conflicts on the network?
Traceroute
Ping
ARP
IP Scanner
33. A user reports that their PC boots into the Advanced Boot Options screen after an update. What is the first course of action to try and resolve this issue?
Select "Start Windows Normally"
Choose "Safe Mode with Networking"
Perform a System Restore
Reinstall Windows
34. . Which modification should be made to the following loop to ensure it executes exactly three times?
int i = 0;
while (i < 3) {
printf("Hello, World!\n");
}
Add i++; inside the loop.
Change i < 3 to i <= 3.
Change while to do while.
Remove int i = 0;.
35. An analyst needs to pull data from a large spreadsheet where the data spans from column A to column G, but only for records where column G equals "Approved". What Excel feature allows for filtering data based on specific criteria in one column?
Conditional Formatting
Data Validation
PivotTable
Filter
36. A network manager needs to set up a secure network for transmitting sensitive data between two corporate buildings. Which networking technology provides a secure connection over a public network?
MPLS
VPN
WPA2
Ethernet
37. What SQL statement is used to remove duplicates from the result set of a SELECT query?
SELECT DISTINCT
SELECT UNIQUE
DELETE DUPLICATES
REMOVE DUPLICATES
38. An application on a Windows 10 machine is not responding, and the user cannot close the window. What is the most immediate action to take in this situation?
Reboot the computer.
Use Task Manager to end the task.
Uninstall and reinstall the application.
Call the software vendor for support.
39. Scenario: You want to add a header to each page of your MS Word document that includes the document title.
Question: What is the correct sequence of steps to add a header in MS Word using keyboard shortcuts?
i. Open your document in MS Word.
ii. Press ALT + N to open the Insert tab.
iii. Press H to open the Header drop-down menu.
iv. Choose a header style or edit your header content as needed.
Select the correct order:
i > ii > iii > iv
i > iv > iii > ii
i > iii > ii > iv
iii > i > ii > iv
40. Which ACID property of a DBMS ensures that once a transaction has been committed, it will remain so, even in the event of power loss, crashes, or errors?
Atomicity
Consistency
Isolation
Durability