Sign up now
to enroll in courses, follow best educators, interact with the community and track your progress.
Previous Year Questions: Solving Tips and Tricks
2,312 plays

Here we discuss many previous year Questions with sime notes and tips to answer MCQs based on computer Aptitude. Next course will be on Higher Education system in India

Navdeep Kaur is teaching live on Unacademy Plus

Navdeep Kaur
JRF Awardee, NET qualified with over 7 years of teaching experience & Expert in NTA UGC NET JRF.

Unacademy user
i am really happy that kaur madam has presented her lectures in English.Till now i had been following her hindi lectures which was of course for many like me had some difficulties. Thank you madam.
very useful content ,thanks to all of you....
very useful content ,thanks to all of you....
Thank u so much mam.
  1. MCQs Solving with tips & tricks Previous year Questions Target JRF ICT with MCQs (for CBSE UGC NET Paper 1) By Navdeep Kaur

  2. Contents Information and communication technology ICT 1 Data Representation, Conversion table 2 Types of data representation 3 Binary, Decimal, Octal, Hexadecimal conversion 4 All Computer Abbreviations 5 MCQs Solving with tips & tricks

  3. 2014 dec 1 CSS stands for (A) Cascading Style Sheets (B) Collecting Style Sheets (C) Comparative Style Sheets (D) Comprehensive Style Sheets Answer: (A) CSS stands for Cascading Style Sheet and is used by web pages to help keep information in the proper display format. CSS files can help define font, size, color, spacing, border and location of HTML information on a web page, and can also be used to create a continuous look throughout multiple pages of a website. 2 MOOC stands for (A) Media Online Open Course (B) Massachusetts Open Online Course (C) Massive Open Online Course (D) Myrind Open Online Course Answer: (C) 2 0

  4. 3. gif, jpg, bmp, png are used as extensions for files which store (A) Audio data (B) Image data (C) Video data (D) Text data Answer: (B) 4. Symbols A-F are used in which one of the following? (A) Binary number system (B) Decimal number system (C) Hexadecimal number system (D) Octal number system Answer: (C) 5. Which one of the following is not a search engine? (A) Google (B) Chrome (C) Yahoo (D) Bing Answer: (B)

  5. 1 Which of the following represents one billion characters? (A) Terabyte (B) Kilobyte (C) Megabyte (D) Gigabyte Answer: D Notes One million=1,000,000 one billion=1,000,000,000=10003 1 byte may hold 1 character 1000 bytes=1 kilobyte 10002 bytes 1 megabyte 2015 june 10003 bytes 1 gigabyte 2 Encoding or scrambling data for transmission across a network is known as: (A) Decryption (C) Detection (B) Protection (D) Encryption Answer: D

  6. 3 Which of the following is not an output device? (A) Keyboard (B) Printer (C) Speaker (D) Monitor Answer: A 4 Which of the following is not open source software? (A) Apache HTTP server (B) Internet explorer (C) Fedora Linux (D) Open office Answer: B The term "open source" refers to something people can modify and share because its design is publicly accessible. Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner. According to scientists who studied it, open-source software is a prominent example of open collaboration. The term is often written without a hyphen as "open source software".

  7. July 2016 1 The statement "the study, design, development, implementatio support or management of computer-based information systems, particularly software applications and computer Hardware" refers to (1) Information Technology (IT) (2) Information and Collaborative Technology (ICT) (3) Information and Data Technology (IDT) (4) Artificial Intelligence (AI) Answer: 1 2 process of copying files to a CD-ROM is known as (1) Burning (2) Zipping (3) Digitizing (4) Ripping Answer1

  8. 3 An unsolicited e-mail message sent to many recipients at once is a (1) Worm (2) Virus (3) Threat (4) Spam Answer 4 is a type of memory circuitry that holds the computer's start-up routine. 4 (1) RIM (Read Initial Memory) (2) RAM (Random Access Memory) (3) ROM (Read Only Memory) (4) Cache Memory Answer: 3 5 An ASCll is a character-encoding scheme that is employed by personal computers in order to represent various characters, numbers and control keys that the computer user selects on the keyboard. ASCII is an acronym for (1) American Standard Code for Information Interchange (2) American Standard Code for Intelligent Information (3) American Standard Code for Information Integrity (4) American Standard Code for Isolated Information Answer: 1

  9. Jan 2017 1. Read the following two statements: I : Information and Communication Technology (ICT) is considered a subset of Information Technology (IT). Il : The 'right to use' a piece of software is termed as copyright. Which of the above statement(s) islare CORRECT? (1) Both I and II (2) Neither I nor II (3) II only (4) I only Notes: Information technology (IT) is the application of computers to store, study, retrieve, transmit, and manipulate data, or information, often in the context of a business or other enterprise. IT is considered a subset of information and communications technology (ICT) Copyright is a legal right created by the law of a country that grants the author of an original work exclusive right for its use and distribution. This means whatever content the author created cannot be used or published by anyone else without the consent of the author.

  10. 2. Which of the following correctly lists computer memory types from highest to lowest speed ? (1) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers (2) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM) (3) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage (4) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage Answer 3 3. Which of the following is a characteristic of Web2.0 applications? (1) Multiple users schedule their time to use Web2.0 applications one by one. (2) Web2.0 applications are focused on the ability for people to collaborate and share information online. (3) Web2.0 applications provide users with content rather than facilitating users to create it. (4) Web2.0 applications use only static pages. Answer2 Examples of Web 2.0 features include social networking sites and social media sites (e.g.,Facebook), blogs, wikis, folksonomies ("tagging" keywords on websites and links), video sharing sites(e.g., YouTube), hosted services, Web applications ("apps"), collaborative consumption platforms, and mashup applications.

  11. 6 Which of the following statement(s) islare TRUE? S1: The decimal number 11 is larger than the hexadecimal number 11. S2: In the binary number 1110.101, the fractional part has the decimal value as 0.625 (1) S1 only (2) S2 only (3) Both S1 and S2 (4) Neither S1 nor S2 Answer: 2 Notes To convert Hexadecimal number to Decimal number, multiply every digit with 16 power of digit location. Then, sum all the multipliers. Decimal representation of hexadecimal number 11 = 1x161+1x160 = 16+1 = 17 To convert decimal fraction to binary, begin with the decimal fraction and multiply by 2 Because .625 x 2 1.25, the first binary digit to the right of the point is a 1. Because .25 x 2 0.50, the second binary digit to the right of the point is a 0. Because .50 x 2 = 1.00, the third binary digit to the right of the point is a 1. In fact, we do not need to multiply the fraction again, because we had 0 as the fractional part of our result there. Hence the representation of .625 = .101 (base 2).