Q1. Which among the following is Android’s latest OS?
(a) Gingerbread
(b) Oreo
(c) Nougat
(d) Lollipop
(e) Marshmallow
Q2. Which among the following statement is not true about NFC or NFC Devices?
(a) NFC is a set of communication protocols
(b) NFC devices are used in contactless payment systems
(c) NFC tags are passive data stores which can be read, and under some circumstances written to, by an NFC device.
(d) NFC has a significant disadvantage over Bluetooth i.e. the longer set-up time.
(e) NFC tags can be custom-encoded by their manufacturers
Q3. Which among the following is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it?
(a) Desktop Virtualization
(b) Augmented Reality
(c) Social Networking
(d) Real-Time OS
(e) CSMA/CA
Q4. e-Governance is generally understood as the use of Information and Communication Technology at all the level of the Government to provide services to the citizens. Which among the following are the types of interactions in e-Governance?
(a) G2B
(b) G2C
(c) G2E
(d) G2G
(e) All of the above
Q5. Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
(a) Tactile Haptics
(b) Biometrics
(c) Virtualization
(d) Data Mining
(e) None of the above
Q6. __________ is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control to modify the software code on the device or install other software that the manufacturer wouldn’t normally allow you to.
(a) Slash
(b) Hacking
(c) Jailbreaking
(d) Booting
(e) Rooting
Q7. Which among the following is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules?
(a) Antivirus
(b) Bug
(c) Firewall
(d) None of the above
(e) All of the above
Q8. Which among the following is an existing social networking platform?
(a) Google+
(b) Yahoo
(c) Zapak
(d) Bing
(e) Explorer
Q9. What is the current version of IMAP?
(a) IMAP version 2
(b) IMAP version 3
(c) IMAP version 4
(d) IMAP version 5
(e) IMAP version 6
Q10. The program that is used by search engines to search the Internet for documents using their Web addresses is known as :
(a) Bing
(b) MSN
(c) Spider
(d) Google
(e) None of these
Q11. Which of the following software posts unwanted advertisements on client’s computer?
(a) Virus
(b) Malware
(c) Worm
(d) Adware
(e) Logic bombs
Q12. __________ is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
(a) Trojan horse
(b) Adware
(c) Spyware
(d) Worm
(e) Viruses
Q13. What is gutter margin?
(a) Margin that is added to the left margin when printing
(b) Margin that is added to right margin when printing
(c) Margin that is added to the binding side of page when printing
(d) Margin that is added to the outside of the page when printing
(e) None of these
Q14. If you wish to extend the length of the network without having the signal degrade, you would use a _____.
(a) Repeater
(b) Router
(c) Gateway
(d) Switch
(e) None of these
Q15. Which disk is used to cold boot a PC?
(a) Setup disk
(b) System disk
(c) Diagnostic Disk
(d) Program disk
(e) None of the above