a combination of computer hardware
a program which translates from high-level language to another
a program which translates from one high-level to a machine level
None of these
Impact printers
Laser printers
Non-impact printers
Optical printers
Magnetic Ink Character Recognition
Magnetic Ink Code Reader
Magnetic Ink Cases Reader
Polling
Job Scheduling
Protection
File Management
www.nielit.gov.in
https://student.nielit.gov.in
https://www.nielit.gov.in
contact@nielit.gov.in
Secondary memory
Primary memory
Main memory
Both (A) and (B)
Read / Write Memory
Long Memory
Permanent Memory
Real Memory
hardware
a device
a program
a hardware concept
Network
Physical
Data Link
Transport
Performance
Reliability
Security
None of the above
Maximum Area Network
Minimum Area Network
Main Area Network
Metropolitan Area Network
Ctrl +Shift +D
Ctrl + U
Ctrl + Shift + U
Ctrl + D
1024
1048576
16384
None
8 Bits
16 Bits
17 Bits
64 Bits
Malicious Intent
Sabotage
Accident Errors
Espionage Agents
phishing
MiTm (Man-in-the-Middle)
Reply attack
All of the Above
Google Docs
LibreOffice Writer
Microsoft Word
All of the above
Trojans
Virus
Spyware
All of these
Downloading illegal software
Accessing hardware on a shared network
Stealing a network’s password
All are treated as Cyber Crime
Chart Title
Data Label
Chart Area
Chart Line
Black And White
Black And Yellow
White And Light Black
None Of These
Insert
Slide
Slide Show
view
Twitter
Linkedin
Telegram
Instagram
To store data
To prevent unauthorized access
To accelerate internet speed
To diagnose network issues
An online scam to steal personal information
A method to speed up internet browsing
A technique for improving network security
A way to encrypt data
Google Drive
Dropbox
OneDrive
USB Flash Drive
Virtual Personal Network
Virtual Private Network
Variable Public Network
Virtual Protocol Network
Virtual Machine
Neural Networks
Virtual Reality
Blockchain
Weather forecasting
Word processing
Internet browsing
Mobile communication
Storing temporary data
Permanent storage of essential programs
High-speed processing
Enhancing graphics performance
Process data
Connect and interface hardware components
Store files
Power the system
To change file permissions
To reduce the file size for easier storage and sharing
To encrypt files for security
To convert files into a different format
Process
Thread
Program
Task
Match the following terms with their correct descriptions.
A-2, B-3, C-1, D-4
A-3, B-4, C-2, D-1
A-1, B-2, C-4, D-3
A-4, B-1, C-3, D-2
Match the following number systems with their characteristics.
A-1, B-2, C-3, D-4
A-4, B-3, C-2, D-1
A-3, B-1, C-4, D-2
A-2, B-4, C-1, D-3
Match the following types of software with their examples.
Match the following computer architecture components with their descriptions.
A-2, B-3, C-4, D-1
Match the following features in LibreOffice Writer with their corresponding descriptions.
A-3, B-1, C-2, D-4
A-4, B-3, C-1, D-2
Match Cybersecurity Measures with Their Purpose in Digital Finance
A-1, B-3, C-2, D-4
Two-Factor Authentication (2FA)
Digital Signature
CAPTCHA
VPN
Match the Cybersecurity Terms with Their Descriptions
1 → D, 2 → C, 3 → E, 4 → F
1 → A, 2 → B, 3 → D, 4 → E
1 → F, 2 → E, 3 → A, 4 → B
1 → B, 2 → D, 3 → F, 4 → C
Match the LibreOffice Calc functions with their output.
1 → E, 2 → B, 3 → D, 4 → C
1 → D, 2 → A, 3 → E, 4 → C
1 → B, 2 → E, 3 → A, 4 → D
1 → B, 2 → C, 3 → A, 4 → E
Match the cryptographic terms with their descriptions.
1 → B, 2 → C, 3 → D, 4 → A
1 → D, 2 → B, 3 → C, 4 → A
1 → C, 2 → A, 3 → B, 4 → D
1 → A, 2 → D, 3 → B, 4 → C
Match the file extensions with their file types.
1 → B, 2 → A, 3 → C, 4 → D
1 → C, 2 → D, 3 → B, 4 → A
1 → D, 2 → C, 3 → A, 4 → B
1 → A, 2 → D, 3 → E, 4 → C
Match the different types of printers with their working mechanisms.
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → C, 3 → B, 4 → D
1 → C, 2 → A, 3 → D, 4 → B
1 → F, 2 → D, 3 → C, 4 → A
Match the types of computer viruses with their behaviors.
1 → C, 2 → B, 3 → A, 4 → D
1 → D, 2 → A, 3 → B, 4 → C
1 → E, 2 → B, 3 → A, 4 → F
Match the software types with their examples.
1 → A, 2 → B, 3 → D, 4 → C
1 → E, 2 → F, 3 → A, 4 → B
1 → D, 2 → C, 3 → B, 4 → A
Arrange the following computer technologies in the correct order from first generation to fifth generation:
1️⃣ Transistors
2️⃣ Vacuum Tubes
3️⃣ Artificial Intelligence (AI) & Quantum Computing
4️⃣ Microprocessors
5️⃣ Integrated Circuits (ICs)
2 → 1 → 5 → 4 → 3
1 → 2 → 4 → 5 → 3
5 → 4 → 3 → 2 → 1
2 → 4 → 1 → 5 → 3
Arrange the following memory types in the correct order from lowest to highest in speed and cost:
1️⃣ Hard Disk Drive (HDD)
2️⃣ Cache Memory
3️⃣ Registers
4️⃣ RAM (Random Access Memory)
5️⃣ Solid-State Drive (SSD)
1 → 4 → 5 → 2 → 3
4 → 2 → 3 → 5 → 1
3 → 2 → 4 → 5 → 1
1 → 5 → 4 → 2 → 3
Authorization
Authentication
Accounting
Encryption
Brute force of passwords
SIM swap attacks
SQL injection
Cross-site scripting
Barcode Reader
QR Scanner
NFC Device
MICR
Trackball
Motion Sensor
Light Pen
Scanner
Graphics Tablet
Touchpad
Biometric Sensor
Joystick
OMR
OCR
Barcode Scanner
Keyboard