Local-server
Client-server
3-tier
None of these
computer-assisted design.
computer application design.
computer application and design.
computer-aided design.
Graphical User interface
Geographical user of internet
Giga uses internet
Graphical unlimited interface
.txt
.doc
.odt
.csv
.ppt /.pptx
.odp
.ods
A dotted border
A dark wide border
A blinking border
By italic text
Desktop
Documents
Download
All of the above
Storing data on physical servers
Accessing software programs on local computers
Providing computing resources over the internet on-demand
Using floppy disks for data storage
300%
3000%
400%
500%
Uniform Resource Locator
Uniform Research Locator
Uniform Resource Link
Uniform Research Link
443
80
22
79
Hyper Text Transfer Protocol
Hyphenation Text Test Program
Hyper Text Transfer Package
None of These
CTRL+E
CTRL+ Alt+ E
CTRL+Shift+E
CTRL+F9
CTRL+Shift+F4
Alt+Shift+F4
Alt+Shift+F5
CTRL+Shift+F5
Standalone generalized markup language
Standalone global makeup language
Standard generalized markup language
Standalone Graphical markup language
International Service Provider
Internet Service Provider
Internet Server Provider
Wireless Local Area Network
Wired Local Area Network
Wireless Local Ambiguity Network
Wired Latent Area Network
1024 rows and 1048576 columns
10000 rows and 32000 columns
1,048,576 rows and 16,384 columns
None of above
National e-Governance Division
Network e-Governance Division
National e-Governance Department
Network e-Governance Department
easy
electrical
electronic
Tim Berners-Lee
Dennis Ritchie
James Gosling
Larry Page
200,000
20,000
2,000
200
Unordered List
Ordered List
Definition List
No List
11
12
13
10
www.digilocker.com
www.digilocker.gov.in
www.digi-locker.gov.in
www.digilocker.in
9
Insert
Edit
Format
Tools
A social media platform
An online file storage service
A digital document wallet
A video streaming service
Reserve Bank of India (RBI)
Securities and Exchange Board of India (SEBI)
Ministry of Electronics and Information Technology (MeitY)
National Aeronautics and Space Administration (NASA)
Cooking recipes
School textbooks
Aadhaar card, PAN card, and driving license
Music albums
Unlimited storage
1 GB
100 MB
10 GB
Convenience of accessing documents anytime, anywhere
Reduction in paperwork and physical storage
Enhanced privacy and security of documents
Ability to order food online
Only government agencies
Only private companies
Both government agencies and private companies
Only educational institutions
16 years
18 years
21 years
There is no age limit
Using Aadhaar number
Using email ID
Using a handwritten signature
Using a mobile number
20 Languages
21 Languages
22 Languages
23Languages
Learning
Training
Designing
Puzzling
The study of human behavior
The simulation of human intelligence by machines
The process of genetic engineering
The study of celestial bodies
Machine learning
Robotics
Nanotechnology
Natural language processing
To develop machines that can think like humans
To develop algorithms that can improve automatically through experience
To develop machines that can perform physical tasks
To develop faster computer processors
Analyzing data with a small number of variables
Analyzing data that exceeds the processing capacity of traditional database systems
Analyzing data stored in physical files
Analyzing data using handwritten calculations
Volume
Velocity
Variety
Validity
To collect as much data as possible
To analyze data quickly without considering accuracy
To derive meaningful insights and make data-driven decisions
To ignore data variety and focus only on volume
Mainframe computers
Traditional relational databases
Cloud computing and distributed computing platforms
Personal computers
To reduce the size of the dataset
o increase data complexity
To clean, transform, and prepare data for analysis
To randomly sample the dataset
To replace human analysts with automated systems
To generate random data samples
To identify meaningful patterns and insights in large datasets
अनुमापकता
Data security and privacy
Limited storage capacity
Data quality and integrity
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Function as a Service (FaaS)
Increased upfront costs
Limited scalability
Reduced IT infrastructure and management costs
Decreased accessibility
Microsoft Azure
VMware vCloud Air
OpenStack
Amazon Web Services (AWS)
Platform as a Server
Product as a Service
Platform as a Service
Program as a Service
Software as a Server
Server as a Service
Software as a Service
Server as a Software
A type of video game
An artificial intelligence technology
A computer-generated simulation of a three-dimensional environment
A physical reality experience
Taste
Smell
Hearing
Touch
Entertainment
Training and simulation
Social networking
Financial analysis
Reduced costs
Increased student engagement and interactivity
Limited accessibility
Inefficient learning process
Virtual vertigo
Simulator sickness
Reality nausea
Cyber dizziness
The process of encoding plaintext into ciphertext
The process of decoding ciphertext into plaintext
The process of analyzing weather data
The process of generating random numbers
Symmetric cryptography
Asymmetric cryptography
Hash cryptography
Quantum cryptography
To encrypt data
To decrypt data
To provide proof of identity and authenticity
To analyze weather data
A type of computer hardware
A digital currency
A distributed ledger technology
An operating system
Centralization
Transparency
Closed network
Single point of failure
Bitcoin
Ethereum
Ripple
A type of cryptocurrency
A digital signature
A group of transactions
A cryptographic hash function
Mining
Trading
Investing
Storing
A type of physical robot used in manufacturing
A software technology that automates repetitive and rule-based tasks
A manual process for data entry
A type of virtual reality simulation
Creative writing
Complex decision-making
Data entry from spreadsheets to databases
Physical labor in a factory
Java
Python
C++
Visual Basic for Applications (VBA)
Phishing
Ransomware
Firewall
Malware
A type of computer virus
A security protocol
A programming language
Antivirus software
Encryption
Intrusion detection system (IDS)
A physical barrier used to prevent unauthorized access to a computer network
A software program or hardware device that monitors and controls incoming and outgoing network traffic
A type of malware
A cybersecurity attack
A social engineering tactic
A security mechanism that requires users to provide two forms of identification to access an account or system
A web browser
A graphics editing software
A word processing program
A spreadsheet application
Spell check
AutoCorrect
Comments
Track Changes
To insert multimedia elements
To format text and objects consistently throughout a document
To create animations
To perform mathematical calculations
To add page numbers, dates, and other information to the top and bottom of each page
To insert hyperlinks
To create bookmarks
To perform database queries
To create charts and graphs
To format cells
To perform calculations and manipulate data
To insert images
A unique identifier for each cell in the spreadsheet
A function used to format cells
A hyperlink to another cell or document
A shortcut key for accessing cells
AutoFilter
Conditional formatting
Pivot tables
Data validation
To apply predefined formatting to cells based on specific conditions
To perform complex calculations and data analysis
To filter and display only the rows that meet specific criteria
To check for errors in the spreadsheet
To filter and display specific rows of data
To restrict the type of data that can be entered into cells
To apply predefined templates and designs to slides
To animate objects and text within slides
To navigate between slides during a presentation
To create dynamic effects when transitioning between slides
Slide Layouts
Slide Transitions
Animation Effects