0% found this document useful (0 votes)
12 views

Part-4-Unit-VIII Information and Communication Technology (ICT) NET SET Paper-1-68-88

The document contains a series of multiple-choice questions and answers related to Information and Communication Technology (ICT) for UGC NET exams. Key topics include computer networking, cybersecurity, cloud computing, and educational resources. It also covers various protocols, software, and technologies relevant to the ICT field.

Uploaded by

tovilas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Part-4-Unit-VIII Information and Communication Technology (ICT) NET SET Paper-1-68-88

The document contains a series of multiple-choice questions and answers related to Information and Communication Technology (ICT) for UGC NET exams. Key topics include computer networking, cybersecurity, cloud computing, and educational resources. It also covers various protocols, software, and technologies relevant to the ICT field.

Uploaded by

tovilas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

What does HTTP stand for?

(a) Hyper Text Transfer Protocol


(b) High Transfer Text Protocol
(c) Hyperlink Text Transfer Page
(d) None of these
✅ Answer: (a) Hyper Text Transfer Protocol

Which one is not a Microsoft product?


(a) Excel
(b) Word
(c) Photoshop
(d) PowerPoint
✅ Answer: (c) Photoshop (Adobe Systems.)

Which of these technologies enables cloud storage?


(a) LAN
(b) SaaS
(c) FTP
(d) VPN
✅ Answer: (b) SaaS
A computer virus can be spread by:
(a) Installing software from untrusted sources
(b) Using firewall
(c) Updating antivirus
(d) Running defragmentation
✅ Answer: (a) Installing software from untrusted sources

Which shortcut is used to paste copied content?


(a) Ctrl + X
(b) Ctrl + V
(c) Ctrl + P
(d) Ctrl + C
✅ Answer: (b) Ctrl + V

Which one of the following is not an ICT tool in teaching?


(a) LMS
(b) Projector
(c) Chalk
(d) MOOC
✅ Answer: (c) Chalk
Which ICT initiative provides access to e-content modules in multiple languages under UGC?
(a) Shodhganga
(b) e-PG Pathshala
(c) National Academic Depository
(d) SAKSHAT
✅ Answer: (b) e-PG Pathshala

Which of the following is a Layer 4 protocol in the OSI model?


(a) IP
(b) TCP
(c) FTP
(d) ICMP
✅ Answer: (b) TCP

Which of the following correctly defines Moore’s Law?


(a) Processor speed doubles every 10 years
(b) Data transfer rate doubles every 5 years
(c) Number of transistors in a chip doubles every 18-24 months
(d) Network bandwidth halves every year
✅ Answer: (c) Number of transistors in a chip doubles every 18-24 months
In the context of cyber security, ‘pharming’ refers to:
(a) Sending fraudulent emails
(b) Monitoring user's online activity
(c) Redirecting traffic from a legitimate site to a fake one
(d) Hacking using malware
✅ Answer: (c) Redirecting traffic from a legitimate site to a fake one

Which of the following is a non-relational NoSQL database?


(a) MySQL
(b) PostgreSQL
(c) MongoDB
(d) SQLite
✅ Answer: (c) MongoDB (10gen (now known as MongoDB, Inc.).)

The IPv6 address space consists of how many bits?


(a) 32
(b) 64
(c) 128
(d) 256
✅ Answer: (c) 128
Which one is NOT a web browser?
(a) Firefox
(b) Facebook
(c) Chrome
(d) Safari
✅ Facebook

Arrange the following in ascending order according to their storage space:


(A) Petabyte
(B) Gigabyte
(C) Terabyte
(D) Kilobyte

Options:
DBCA
CBAD
ACBD
ABCD
Ans: Kilobyte → Gigabyte → Terabyte → Petabyte

The IPv4 address space consists of how many bits?


(a) 32
(b) 64
(c) 128
(d) 256
✅ Answer: (a) 32
Which of the following are malware?
(A) Virus
(B) Worm
(C) Ransomware
(D) Trojan

Options:
A
AD
ABCD
BC
Ans: ABCD

Identify the correct order in which the following actions A-D take place in an interaction between a web browser
and a web server when you plan to visit Amazon website to purchase a Solid State Drive (SSD).
(A) The web browser requests a webpage using HTTP
(B) The web browser establishes a TCP connection with the Amazon’s web server
(C) The web server sends the requested webpage using HTTP
(D) The web browser finds the IP address of Amazon’s website using DNS

Options:
ABDC
BACD
1. Which of the following number systems is used by computers to represent data?

● A) Decimal
● B) Binary
● C) Hexadecimal
● D) All of the above

Answer: D) All of the above

What is the hexadecimal equivalent of the binary number 101110? A) 2E

B) 3A

C) 5F

D) 6D What is the octal equivalent of the decimal number 65?

Answer: A) 2E ● A) 101

● B) 110

● C) 121

● D) 130

Answer: C) 121
UGC NET 2023 (June) Paper 1 – ICT Questions

1. Which of the following is an example of an Open Educational Resource (OER)?


(A) Wikipedia
(B) Khan Academy
(C) SWAYAM
(D) All of the above
Answer: (D) All of the above

2. Which protocol is used for secure communication over a computer network?


(A) HTTP
(B) FTP
(C) HTTPS
(D) SMTP
Answer: (C) HTTPS

3. What is the full form of MOOC?


(A) Massive Open Online Course
(B) Multimedia Online Open Course
(C) Managed Open Online Content
(D) None of the above
Answer: (A) Massive Open Online Course
4. Which of the following is a cloud storage service?
(A) Google Drive
(B) Dropbox
(C) OneDrive
(D) All of the above
Answer: (D) All of the above

5. Which software is used for video conferencing?


(A) Zoom
(B) Microsoft Teams
(C) Google Meet
(D) All of the above
Answer: (D) All of the above

6. What is the purpose of a firewall in a network?


(A) To block unauthorized access
(B) To increase internet speed
(C) To store data
(D) To create websites
Answer: (A) To block unauthorized access
7. Which of the following is a feature of Web 2.0?
(A) Static web pages
(B) Usergenerated content
(C) No interactivity
(D) Limited collaboration
Answer: (B) Usergenerated content

8. What does ICT stand for?


(A) Information and Computer Technology
(B) Internet and Communication Technology
(C) Information and Communication Technology
(D) Integrated Communication Technology
Answer: (C) Information and Communication Technology

Key Topics Covered in NET Paper 1 (ICT Section):


Basic Computer & Networking Terms (HTTP, HTTPS, Firewall)
ELearning & Digital Education (MOOCs, OER, SWAYAM)
Cloud Computing & Storage (Google Drive, OneDrive)
Web Technologies (Web 2.0, Social Media)
Cybersecurity & Privacy (Firewall, HTTPS)
UGC NET December 2022 (Cycle 2) Paper 1
1. Which of the following is a realtime messaging application?
(A) WhatsApp
(B) Telegram
(C) Signal
(D) All of the above
Answer: (D) All of the above

2. What is the full form of URL?


(A) Uniform Resource Locator
(B) Universal Resource Locator
(C) Uniform Retrieval Locator
(D) Universal Retrieval Locator
Answer: (A) Uniform Resource Locator

3. Which of the following is an example of a Learning Management System (LMS)?


(A) Moodle
(B) Blackboard
(C) Google Classroom
(D) All of the above
Answer: (D) All of the above
4. Which protocol is used to send emails?
(A) HTTP
(B) FTP
(C) SMTP
(D) TCP
Answer: (C) SMTP (Simple Mail Transfer Protocol)

5. What is the purpose of a VPN?


(A) To increase internet speed
(B) To provide secure and private internet access
(C) To store large files
(D) To create websites
Answer: (B) To provide secure and private internet access

6. Which of the following is an example of a search engine?


(A) Google
(B) Bing
(C) Yahoo
(D) All of the above
Answer: (D) All of the above
7. What does PDF stand for?
(A) Portable Document Format
(B) Personal Data File
(C) Printed Document File
(D) Public Domain Format
Answer: (A) Portable Document Format

8. Which of the following is a feature of cloud computing?


(A) Ondemand selfservice
(B) Broad network access
(C) Resource pooling
(D) All of the above
Answer: (D) All of the above

9. What is the primary function of an operating system?


(A) To manage hardware and software resources
(B) To design websites
(C) To create databases
(D) To send emails
Answer: (A) To manage hardware and software resources
10. Which of the following is an opensource operating system?
(A) Windows
(B) macOS
(C) Linux
(D) iOS
Answer: (C) Linux

Key Topics Covered in NET 2022 (Dec) Paper 1 (ICT Section)


✔ Basic Computer & Internet Terms (URL, PDF, SMTP)
✔ Digital Communication Tools (WhatsApp, Telegram, Email)
✔ ELearning & LMS (Moodle, Google Classroom)
✔ Cloud Computing & Security (VPN, Cloud features)
✔ Operating Systems & Software (Linux, OS functions)
UGC NET 2021 (June & December) Paper 1
1. Which device converts digital signals to analog signals for telephone line transmission?
(A) Router
(B) Switch
(C) Modem
(D) Hub
Answer: (C) Modem

2. What is the full form of 'ASCII'?


(A) American Standard Code for Information Interchange
(B) Asian Standard Code for Information Interchange
(C) American Scientific Code for Information Interchange
(D) None of the above
Answer: (A) American Standard Code for Information Interchange

3. Which generation of computers used transistors?


(A) First
(B) Second
(C) Third
(D) Fourth
Answer: (B) Second
4. Which of these is *not* a web browser?
(A) Mozilla Firefox
(B) Google Chrome
(C) Microsoft Edge
(D) Microsoft Word
Answer: (D) Microsoft Word

5. What is the primary purpose of an RSS feed?


(A) Realtime gaming
(B) Aggregating news/updates from websites
(C) Video conferencing
(D) Cloud storage
Answer: (B) Aggregating news/updates from websites

6. Which protocol is used to transfer files over the internet?


(A) HTTP
(B) FTP
(C) SMTP
(D) TCP
Answer: (B) FTP (File Transfer Protocol)
7. Which technology is used in contactless payments like UPI? NFC – Near Field Communication
(A) NFC RFID – Radio Frequency Identification
(B) Bluetooth GPS – Global Positioning System
(C) RFID
(D) GPS
Answer: (A) NFC (Near Field Communication) Key Topics Covered
Networking Basics (Modem, FTP, Protocols)
8. What is 'phishing' in cybersecurity? Computer History (Generations of computers, ASCII)
(A) A fishing game Cybersecurity (Phishing, NFC)
(B) Stealing data by impersonating legitimate entities Research Tools (SPSS, RSS feeds)
Web Technologies (Browsers vs. Applications)
(C) A type of hardware
(D) Cloud storage service
Answer: (B) Stealing data by impersonating legitimate entities

9. Which software is used for statistical analysis in research?


(A) SPSS
(B) AutoCAD
(C) Photoshop
(D) MS Word
Answer: (A) SPSS
UGC NET June 2020 – ICT Questions

1. Which of the following is an example of system software?


(A) Microsoft Word
(B) Windows OS
(C) Photoshop
(D) VLC Media Player
Answer:(B) Windows OS

2. What is the full form of 'HTML'?


(A) Hyper Text Markup Language
(B) High Text Machine Language
(C) Hyper Tabular Markup Language
(D) None of the above
Answer:(A) Hyper Text Markup Language

3. Which of these is a volatile memory?


(A) ROM
(B) Hard Disk
(C) RAM
(D) SSD
Answer:(C) RAM
4. Which of the following is *not* a database management system?
(A) MySQL
(B) Oracle
(C) MS Excel
(D) MongoDB
Answer:(C) MS Excel

5. What does 'AI' stand for in computer science?


(A) Automated Input
(B) Artificial Intelligence
(C) Automated Intelligence
(D) Advanced Interface
Answer:(B) Artificial Intelligence

6. Which device connects multiple computers in a LAN?


(A) Modem
(B) Router
(C) Switch
(D) USB Hub
Answer:(C) Switch
7. Which of these is a feature of 'Open Source
Software'?
(A) Paid licensing
(B) Source code is modifiable
(C) Only usable by governments
(D) No internet required
Answer:(B) Source code is modifiable

8. What is the primary use of 'Bluetooth' technology?


(A) Longdistance wired communication
(B) Shortrange wireless data transfer
(C) Satellite communication Key Topics Covered in 2020 Papers
(D) Power supply transmission Software Types(System vs Application software)
Answer:(B) Shortrange wireless data transfer Memory Types(Volatile vs Nonvolatile)
Networking Devices(Switch, Router, Modem)
9. Which key combination is used to permanently delete Database Systems(MySQL vs Excel)
a file in Windows? Emerging Technologies(AI, Open Source)
(A) Ctrl + D Shortcut Keys(Shift + Delete)
(B) Shift + Delete
(C) Alt + Delete
(D) Ctrl + Alt + Delete
Answer:(B) Shift + Delete

You might also like