UPSSSC Junior Assistant Computer Question (Previous Year Paper MCQ)

821 views 19 slides Feb 13, 2025
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

UPSSSC Junior Assistant Computer Question Previous Year Paper MCQ Book PDF Free Download. Important MCQs on Concepts and latest developments in the field of Computer & Information Technology. Emerging Trends in IT Sector Questions.


Slide Content

UPSSSC Junior Assistant Computer MCQ
Important Question Bank
Emerging Trends or Concepts and latest developments in the field of Computer &
Information Technology

1. Uttar Pradesh Ranks ______ in terms of software exports from India. [UPSSSC Junior Assistant]
a) first
b) second
c) third
d) fourth
Ans. d

2. India ranks _____ in the Global innovation index 2019. [UPSSSC Junior Assistant]
a) 47
th

b) 52
nd

c) 59
th

d) 63
rd

Ans. b

Concepts of Computer & Information Technology & Knowledge of Contemporary Technological
Developments & Innovation in this field [UPSSSC Junior Assistant 2023]
3. Which feature of a word processing software such as Microsoft Word enables the creation of a table of
contents based on document headings?
a) Hyperlinks
b) Styles
c) Spelling and Grammar Check
d) Mail merge
Ans. b

4. The first mechanical calculator was called ____
a) Calculator
b) Orpat
c) Galelio
d) Pascaline
Ans. d

5. In Microsoft excel, which function removes all nonprintable characters from text?
a) Clean b) If
c) Nested If d) Iferror
Ans. a

6. The k-Means algorithm is an _______ algorithm.
a) Supervised Learning
b) Unsupervised Learning
c) Semi-supervised learning
d) Reinforcement Learning
Ans. b

7. Which technology is commonly used for wireless communication in IoT devices?
a) Bluetooth
b) Ethernet
c) Fibre Optic
d) USB
Ans. a

8. A major part of the Apache Hadoop framework is written in ______ language.
a) C++
b) Python
c) JAVA
d) R Programming
Ans. c

9. Which of the given languages is not commonly used for implementing AI applications?
a) LISP
b) PROLOG
c) Python
d) Perl
Ans. d

10. Which e-mail service is operated by Microsoft?
a) Yahoo mail
b) Outlook
c) Gmail
d) iCloud Mail
Ans. b

11. What is the term for a cyber-security attack that targets multiple interconnected devices
simultaneously to create a large-scale attack network?
a) DDoS attack b) Botnet attack c) Zero-day attack d) Spear phishing attack
Ans. b

12. The inventor of the World Wide Web is______
a) Tim Cook b) Bill Gates
c) Tim Berners-Lee d) Mark Zuckerberg
Ans. c

13. What is the primary purpose of hastags in social media?
a) To mark keywords or topics for easy searchability
b) To indicate sarcasm or irony in a post
c) To identify the author of a post
d) To categorize posts based on their sentiment
Ans. a

14. Which technology is often used to ensure the security and authenticity of digital documents in e-
governance?
a) Digital signatures
b) Virtual Private Networks (VPNs)
c) Distributed Ledger Technology (DLT)
d) Cloud computing
Ans. a

15. The user name and the domain name parts of an e-mail address are separated by the ______ symbol.
a) #
b) @
c) &
d) $
Ans. b

16. A computer’s CPU consists of millions of tiny switches called ______
a) bits
b) bytes
c) transistors
d) registers
Ans. c

17. If a PowerPoint presentation contains sensitive or confidential data, you can encrypt the file and
protect it with a _____.
a) Password
b) Protect
c) Presentation
d) Public
Ans. a

18. The ‘Chat GPT’ is owned by [UPSSSC Junior Assistant 2024]
a) MaestroQA
b) NVIDIA
c) OpenAI
d) Anthropic
e) None of the above
Ans. c

19. Important UPSSSC Junior Assistant Computer Questions
1 Terabyte per second = ______ bytes per second
a) 2
40

b) 2
10

c) 2
20

d) 2
30

Ans. a

20. _______ a high-speed device used in CPU that is utilised to store data temporarily during processing.
a) Arithmetic and Logic Unit (ALU)
b) Auxiliary Memory
c) Control Unit
d) Registers
Ans. d

21. What is the function of F11 in the Excel sheet?
a) Select entire sheet
b) Used for creating a chart from the selected cell
c) Past selected column
d) Copy selected rows
Ans. b

22. Which of the following keyboard shortcut is used to perform UNDO operation in MS-Word?
a) Alt + Z
b) Alt + U
c) Ctrl + U
d) Ctrl + Z
Ans. d

23. Which among the following owns ‘Android’?
a) Apple
b) Google
c) Microsoft
d) Amazon
Ans. b

24. Which among the following is not a computer virus but is, basically, a computer language?
a) Python
b) Code Red
c) Conficker
d) Sasser
Ans. a

25. ______ is an operating system (OS) intended to serve real-time applications that process data as it
comes in, without delay.
a) DOS
b) Lynx
c) Windows XP
d) Real-time operating system
Ans. d

26. Flash drive is popularly known as
a) Microprocessor
b) RAM
c) ROM
d) Pen drive
Ans. d

27. Which of the following keyboard shortcuts represents the start menu in the Windows operating
system?
a) Ctrl + Z
b) Alt + Spacebar
c) Ctrl + Esc
d) Alt + Enter
Ans. c

28. To whom does Ray Tomlinson go to the credit?
a) send first email
b) he built the first computer
c) invention of calculator
d) development of the internet
Ans. a

29. Which of the following tasks is not performed by a computer’s CPU?
a) Fetching instructions
b) Instruction interpretation
c) Storing data permanently
d) Data processing / processing
Ans. c

30. Which of the following is not a computer programming language?
a) C++
b) Objective-C
c) C#
d) A@
Ans. d

31. The process used to remove magnetism from a cathode ray tube (CRT) computer monitor is called __
a) Deworm
b) Dope
c) Degauss
d) Bounce
Ans. c

32. A/An _____ is a programme or a computer that connects to and requests information from a server.
a) Access
b) Bridge
c) Client
d) Captcha
Ans. c

33. Which file type has the file extension bat?
a) Adobe Photoshop
b) Web page imagemap
c) Macintosh BinHex
d) PC batch file
Ans. d

34. What is the purpose of a firewall in computer security?
(a) To prevent viruses from entering a computer
(b) To control network traffic and block unauthorized access
(c) To encrypt sensitive data
(d) To detect and remove malware
Ans. b

35. What is the purpose of an IP address?
(a) To identify a specific device on a network
(b) To encrypt data transmitted over the internet
(c) To provide a domain name for a website
(d) To route network traffic to the correct destination
Ans. a

36. What is cloud computing?
(a) Storing data on a local server (b) Accessing computing resources over the internet
(c) Developing software applications (d) Managing computer hardware
Ans. b

37. Which of the following is a recent development in artificial intelligence?
(a) Machine learning (b) Deep learning
(c) Natural language processing (d) All of the above
Ans. d

38. What is blockchain technology primarily known for?
(a) Secure and transparent record-keeping
(b) High-speed data transfer
(c) Advanced data analytics
(d) Real-time video streaming
Ans. a

39. Which of these is a popular example of a virtual reality (VR) headset?
(a) Oculus Quest
(b) Apple Watch
(c) Amazon Echo
(d) Google Pixel
Ans. a

40. What is the Internet of Things (IoT)?
(a) A network of interconnected devices
(b) A type of cloud computing service
(c) A new programming language
(d) A set of communication protocols
Ans. a

41. Which of the following is a potential application of 5G technology?
(a) Faster mobile internet speeds
(b) Increased capacity for connected devices
(c) Reduced latency for real-time applications
(d) All of the above
Ans. d

42. What is an operating system?
(a) Application software (b) System software (c) Hardware component (d) Programming language
Ans. b

43. Which of these is a popular operating system?
(a) Microsoft Word (b) Windows 10 (c) Google Chrome (d) Adobe Photoshop
Ans. b

44. What is the purpose of a file extension?
(a) To name the file (b) To identify the file type
(c) To encrypt the file (d) To compress the file

45. Which file extension is used for text documents?
(a) .jpg (b) .exe (c) .txt (d) .mp3
Ans. c

46. What is a folder used for?
(a) To delete files (b) To organize files (c) To run programs (d) To create new files
Ans. b

47. What is a web browser?
(a) A website (b) A software application to access the internet (c) A search engine (d) A programming
language
Ans. b

48. What is an email?
(a) A type of software (b) A method of exchanging messages electronically
(c) A web browser (d) A search engine
Ans. b

49. What is a search engine?
(a) A web browser
(b) A website that helps users find information on the internet
(c) An email client
(d) A social media platform
Ans. b

50. What is a domain name?
(a) An IP address (b) A human-friendly name for a website (c) A URL (d) A file name
Ans. b

51. What is a hyperlink?
(a) A web address (b) A link to another web page or resource (c) A website (d) A search engine
Ans. b

52. What is data?
(a) Information that has been processed (b) Raw, unorganized facts (c) A program (d) A website
Ans. b

53. What is a database?
a) A type of software (b) An organized collection of data (c) A hardware component (d) A network
Ans. b

54. What is a router?
(a) A type of software
(b) A device that forwards data packets between networks
(c) A hardware component
(d) A network protocol
Ans. b

55. What is a protocol?
(a) A hardware component
(b) A set of rules that govern communication between devices
(c) A type of software
(d) A network
Ans. b

56. What is TCP/IP?
(a) A type of hardware
(b) A suite of communication protocols used on the internet
(c) A type of software
(d) A network
Ans. b

57. What is a server?
(a) A client computer
(b) A computer that provides services to other computers
(c) A network device
(d) A software application
Ans. b

58. What is artificial intelligence (AI)?
(a) A type of hardware
(b) The ability of a computer to mimic human intelligence
(c) A programming language
(d) A network protocol
Ans. b

59. What is machine learning (ML)?
(a) A type of hardware
(b) A subset of AI that allows computers to learn from data
(c) A programming language
(d) A network protocol
Ans. b

60. What is deep learning (DL)?
(a) A type of hardware
(b) A subset of ML that uses artificial neural networks with multiple layers
(c) A programming language
(d) A network protocol
Ans. b

61. What is the Internet of Things (IoT)?
(a) A type of network
(b) A network of interconnected devices embedded with software and sensors
(c) A programming language
(d) A cloud computing service
Ans. b

62. What is big data?
(a) Small datasets
(b) Extremely large datasets that can be analyzed to reveal patterns and trends
(c) A type of software
(d) A hardware component
Ans. b

63. What is blockchain technology?
(a) A type of database
(b) A decentralized and distributed ledger technology
(c) A programming language
(d) A cloud computing service
Ans. b

64. What is cryptocurrency?
(a) Traditional currency
(b) Digital or virtual currency that uses cryptography for security
(c) Stock market shares
(d) Gold
Ans. b

65. Which of these is a popular cryptocurrency?
(a) US Dollar
(b) Bitcoin
(c) Indian Rupee
(d) Euro
Ans. b

66. What is virtual reality (VR)?
(a) A type of video game
(b) A simulated experience that can be similar to or completely different from the real world
(c) A type of social media
(d) A cloud computing service
Ans. b

67. What is augmented reality (AR)?
(a) A simulated experience
(b) A technology that overlays digital information onto the real world
(c) A type of social media
(d) A cloud computing service
Ans. b

68. Which of these is a potential application of VR/AR?
(a) Gaming (b) Education (c) Healthcare (d) All of the above
Ans. d

69. What is 5G?
(a) A type of Wi-Fi
(b) The next generation of mobile network technology
(c) A type of Bluetooth
(d) A cloud computing service
Ans. b

70. Which of these is a benefit of 5G?
(a) Faster speeds (b) Lower latency (c) Increased capacity (d) All of the above
Ans. d

71. What is edge computing?
(a) Cloud computing
(b) Processing data closer to the source where it is generated
(c) Centralized data processing
(d) A type of network
Ans. b

72. What is quantum computing?
(a) Traditional computing (b) A type of computing that uses quantum mechanics
(c) Cloud computing (d) Edge computing
Ans. b

73. What is cybersecurity threat intelligence?
(a) Hacking (b) Information about potential cyber threats (c) Antivirus software (d) Firewalls
Ans. b

74. What is phishing?
(a) A type of fish
(b) A fraudulent attempt to obtain sensitive information
(c) Cybersecurity software
(d) Network security
Ans. b

75. What is ransomware?
(a) Antivirus software (b) Malware that encrypts a victim's files and demands a ransom
(c) A type of network (d) A cloud computing service
Ans. b

76. What is a denial-of-service (DoS) attack?
(a) Antivirus software (b) An attack that disrupts the availability of a service
(c) A type of network (d) A cloud computing service
Ans. b

77. What is data privacy?
(a) Data security (b) The right to control one's personal information (c) Data analysis (d) Data storage
Ans. b

78. What is GDPR?
(a) A type of software (b) General Data Protection Regulation (c) A type of hardware (d) A network protocol
Ans. b

79. What is data mining?
(a) Stealing data (b) Discovering patterns and insights from large datasets (c) Data storage (d) Data privacy
Ans. b

80. What is data analytics?
(a) Data storage (b) The process of examining data to draw conclusions (c) Data privacy (d) Data security
Ans. b

81. What is business intelligence (BI)?
(a) Personal intelligence (b) Using data analysis to improve business decisions
(c) Artificial intelligence (d) Machine learning
Ans. b

82. What is a data warehouse?
(a) A small database
(b) A large repository of data from multiple sources
(c) A data mining tool
(d) A data analytics tool
Ans. b

83. What is a data lake?
(a) A small database
(b) A repository of raw data in its native format
(c) A data mining tool
(d) A data analytics tool
Ans. b

84. What is a chatbot?
(a) A type of robot (b) A computer program designed to simulate conversation
(c) A search engine (d) A social media platform
Ans. b

85. What is natural language processing (NLP)?
(a) Programming languages
(b) The ability of computers to understand and process human language
(c) Data mining
(d) Data analytics
Ans. b

86. What is computer vision?
(a) Human vision (b) The ability of computers to "see" and interpret images
(c) Data mining (d) Data analytics
Ans. b

87. What is the cloud?
(a) Your computer (b) A network of servers providing computing resources
(c) The internet itself (d) A type of hardware
Ans. b

88. What is SaaS? (a) Hardware as a Service
(b) Software as a Service (c) Platform as a Service (d) Infrastructure as a Service
Ans. b

89. What is PaaS?
(a) Software as a Service (b) Platform as a Service (c) Infrastructure as a Service (d) Data as a Service
Ans. b

90. What is IaaS?
(a) Software as a Service (b) Platform as a Service (c) Infrastructure as a Service (d) Data as a Service
Ans. c

91. What is serverless computing?
(a) Computing without servers (b) Cloud computing where the provider manages the servers
(c) On-premise servers (d) Edge computing
Ans. b

92. What is containerization?
(a) Storing data in containers (b) Packaging software with its dependencies
(c) Virtualization (d) Cloud computing
Ans. b

93. What is Kubernetes?
(a) A type of container (b) A container orchestration platform
(c) A cloud platform (d) A programming language
Ans. b

94. What is DevOps?
(a) Development only (b) A set of practices that combines software development and IT operations
(c) Operations only (d) Testing only
Ans. b

95. What is Agile development?
(a) Slow development (b) An iterative and incremental approach to software development
(c) Waterfall development (d) Traditional development
Ans. b

96. What is the World Wide Web (WWW)?
(a) The internet itself (b) A system of interconnected documents and resources accessed via the internet
(c) A type of software (d) A hardware component
Ans. b

97. What is a web page?
(a) A website (b) A document on the World Wide Web (c) A web browser (d) A search engine
Ans. b

98. What is a web server?
(a) A web browser (b) A computer that stores and serves web pages (c) A website (d) A search engine
Ans. b

99. What is CSS (Cascading Style Sheets)?
(a) A programming language (b) A style sheet language for styling web pages
(c) A web browser (d) A search engine
Ans. b

100. What is JavaScript?
(a) A markup language (b) A programming language for adding interactivity to web pages
(c) A web browser (d) A search engine
Ans. b

101. What is SQL (Structured Query Language)?
(a) A programming language
(b) A language for managing and manipulating databases
(c) A database system
(d) A network protocol
Ans. b

102. What is NoSQL?
(a) Only SQL databases (b) Non-relational databases (c) Only No databases (d) New SQL databases
Ans. b

103. What is the function of RAM?
(a) Permanent storage (b) Temporary storage (c) Processing data (d) Displaying output
Ans. b

103. A peripheral device is:
(a) Inside the CPU (b) Connected to the computer (c) Part of the operating system (d) Software
Ans. b

104. What is a folder?
(a) A file (b) A container for files (c) A program (d) A device
Ans. b

105. What is an IP address?
(a) Web address (b) Numerical label for a device on a network (c) Domain name (d) File name
Ans. b

106. What is an email?
(a) Type of software (b) Method of electronic messaging (c) Web browser (d) Search engine
Ans. b

107. What is a modem?
(a) Type of software (b) Device for internet access (c) Hardware component (d) Network protocol
Ans. b

108. What is a router?
(a) Type of software (b) Device for network traffic management
(c) Hardware component (d) Network protocol
Ans. b

109. What is encryption?
(a) Making data readable (b) Converting data into an unreadable format (c) Deleting data (d) Sharing data
Ans. b

110. What is decryption?
(a) Making data unreadable
(b) Converting encrypted data back to readable format
(c) Deleting data
(d) Sharing data
Ans. b

111. What is a digital signature?
(a) A handwritten signature (b) An electronic signature verifying authenticity (c) A stamp (d) A watermark
Ans. b

112. What is a certificate authority?
(a) A hacker (b) A trusted entity that issues digital certificates
(c) A software vendor (d) A government agency
Ans. b

113. What is two-factor authentication (2FA)?
(a) Using only a password (b) Using two forms of identification
(c) Using biometrics only (d) Using a security question
Ans. b

114. What is spyware?
(a) Software that cleans your computer (b) Software that secretly monitors your activity
(c) Antivirus software (d) A firewall
Ans. b

115. What is shareware?
(a) Free software (b) Software offered for trial with payment required for full functionality
(c) Open-source software (d) Proprietary software
Ans. b

116. What is a programming language?
(a) A web browser (b) A language for writing computer programs
(c) An operating system (d) Application software
Ans. b

117. What is a video editor?
(a) A word processor (b) A software application for creating and editing videos
(c) A database (d) A presentation software
Ans. b

118. What is an email client?
(a) A website (b) Software to manage emails (c) Search engine (d) Programming language
Ans. b

119. Which of these is a popular email client?
(a) Chrome
(b) Outlook
(c) Excel
(d) PowerPoint
Ans. b

120. Which of this is not a computer crime?
A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D

121. Which file is used to store the user entered password?
A. .exe
B. .txt
C. .iso
D. .sam
Ans: D

122. __________is the process of recording as much data as possible to create reports and analysis on
user input.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: A

123. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B

124. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk B. Storing data C. Finding configuration files. D. Deleting files.
Ans: C

125. The maturity levels used to measure a process are
a) Initial, Repeatable, Defined, Managed, Optimized
b) Primary, Secondary, Defined, Managed, Optimized
c) Initial, Stating, Defined, Managed, Optimized
d) None of these
Ans. a

126. Identify the Risk factors which are associated with Electronic payment system.
a) Fraudulent use of Credit Cards b) Sending Credit Card details over internet
c) Remote storage Credit Card details d) All of these
Ans. d

127. Eco System is a framework for
a) building a computer system b) Building internet market
c) Building offline market d) Building market
Ans. b

127. ______ is process of extracting previously non known valid and actionable information from large
data to make crucial business and strategic decisions.
a) Data management b) Data mining c) Meta Data d) Data base
Ans. b

128. Which are the classifications of data used in mobile applications?
a) Private data, user data, shared data b) Public data, user data, virtual data
c) Private data, public data, shared data d) Public data, virtual data, user data
Ans. c

129. Electronic Data interchange software consists of the following four layers:
a) Business application, internal format conversion, Network translator, EDI envelope
b) Business application, Internal format conversion, EDI translator, EDI envelope
c) Application layer, transport layer, EDI translator, EDI envelope
d) Application layer, Transport layer, IP layer, EDI envelope
Ans. d

130. Which e-commerce model allows consumers to name their own price for products and services?
a) B2B b) B2G
c) C2C d) C2B
Ans. c

UPSSSC Jr. Assistant 2023 Question Paper
UPSSC Junior Assistant 202?

Computer Best MCQ Book in Just Rs.29/- [7000+ Question in English]

Computer Best MCQ Book in Just Rs.25/- (2100+ Question in Hindi)


HEETSON

Telegram https://t.me/Heetson_Official
WhatsApp Channel

@heetsoniti