Solved Paper Data Entry Operator 2021 [Part-2] – HPSSC Hamirpur

By | November 19, 2021

61. Communication between a computer device and a keyboard involves _____ transmission.

  1. Simpex
  2. Half-duplex
  3. Full-duplex
  4. Both (A) and (B)

62. To connect a computer with a device in the room, we might be likely to use a

  1. Coaxial cable
  2. Dedicated line
  3. Ground station
  4. All of these

63. A communication network which is used by large organizations over regional, national or global area is

  1. LAN
  2. WAN
  3. MAN
  4. Internet

64. A device that can convert digital signals to analog signals is a/an

  1. Packet
  2. Modem
  3. Emulator
  4. All of these

65. End to end connectivity is provided from host-to-host in

  1. Network layer
  2. Session layer
  3. Datalink layer
  4. Transport layer

66. Which is just the opposite of download?

  1. Upgrade
  2. Access
  3. Upload
  4. Push

67. The weakest link in any computer security system is

  1. People
  2. Hardware
  3. Programme
  4. Communication system

68. When a logic bomb is activated by a time-related event, it is known as a

  1. Time related bomb sequence
  2. Virus
  3. Time bomb
  4. Trojan horse

69. When was the first recorded cyber crime took place?

  1. 1820
  2. 1850
  3. 1880
  4. 1910

70. The NAND’ gate output will be low, if the two inputs are

  1. 00
  2. 01
  3. 10
  4. 11

71. Grammar of the programming is checked at ………………. Phase of compiler.

  1. Semantic analysis
  2. Code generation
  3. Syntax analysis
  4. Code optimization

72. ‘C’ is a ……………… generation language.

  1. 2nd
  2. 3rd
  3. 4th
  4. 5th

73. Terminal node is also known as

  1. Last node
  2. Leaf node
  3. Ended node
  4. All of these

74. Shift reduce parsers are

  1. Top down parser
  2. Bottom up parser
  3. Right- most parser
  4. Left-most parser

75. Software quality metrics focus on the

  1. Process
  2. Project
  3. Product
  4. All of these

76. A/An …………….. in C language is also known as record.

  1. Array
  2. Structure
  3. Pointer
  4. Enum

77. In data structure each item in a linked list is called

  1. Element
  2. Information
  3. Data
  4. Node

78. In SQL, which command is used to changes data in a data table?

  1. UPDATE
  2. INSERT
  3. BROWSE
  4. APPEND

79. With respect to a network interface card, the term 10/100 refers to

  1. Protocol speed
  2. A fibre speed
  3. Megabits per second
  4. None of these

80. A hard disk is divided into tracks which are further subdivided into

  1. Clusters
  2. Sectors
  3. Vectors
  4. Heads

81. Which part of the LASER printer should not be exposed to sunlight?

  1. Transfer corona assembly
  2. PC drum
  3. Toner cartridge
  4. None of these

82. Modems use which transmission?

  1. Synchronous
  2. Asynchronous
  3. Timed interval
  4. ATA

83. Changing computer language of 1’s and 0’s to characters that a person can understand is

  1. Highlight
  2. Clip Art
  3. Highlight
  4. Execute

84. How many bits in a byte?

  1. 8
  2. 32
  3. 64
  4. 128

85. The speed of your net access is defined in terms of

  1. RAM
  2. MHz
  3. Kbps
  4. Megabytes

86. Another word for ‘Graphics for a word processor’ is

  1. Peripheral
  2. Clip Art
  3. Highlight
  4. Execute

87. Which is part of a database that holds only one type of information?

  1. Report
  2. Field
  3. Record
  4. File

88. What do you call a computer on a network that requests files from another Computer?

  1. A client
  2. A host
  3. A router
  4. A web server

89. Which is not an internet protocol ?

  1. HTTP
  2. FTP
  3. STP
  4. IP

90. Which is not a programming language?

  1. Basic
  2. Java
  3. Turing
  4. C++

91. Which operating system is produced by IBM ?

  1. OS-2
  2. Windows
  3. DOS
  4. UNIX

92. What is not always necessary for accessing the web?

  1. A web browser
  2. A computer
  3. A modem
  4. A connection to an internet access provider

93. Which of the following word processors came first ?

  1. Word perfect
  2. Lotus Notes
  3. MS Word
  4. Word Star

94. The first graphical browser for the www was named

  1. Netscape
  2. Veronica
  3. Mosaic
  4. Explorer

95. Pentium is related with which part of the computer ?

  1. DVD
  2. Hard disk
  3. Microprocessor
  4. Mouse

96. Which option is used to get back the information immediately after deleting from the file?

  1. Undo
  2. Redo
  3. Copy
  4. Paste

97. Which toolbar is used to change the font and font size in MS word?

  1. Formatting toolbar
  2. Standard toolbar
  3. Font toolbar
  4. Text toolbar

98. Which program does not fall into the MS office package?

  1. Word
  2. Excel
  3. Writer
  4. Access

99. Which is not an operating system?

  1. Windows XP
  2. Linus
  3. Ubuntu
  4. Apple

100. Which program is used to compress the big file into small file?

  1. winZip
  2. winspread
  3. winstyple
  4. winmicro

101. USB stands for

  1. Universal Security Block
  2. Universal Serial Bus
  3. Universal Software Barrier
  4. Universal Stage Base

102. Which is not Application Software?

  1. Windows NT
  2. PAGE Maker
  3. Win Word XP
  4. Photoshop

103. Which function key is used to check the grammar and spelling in MS Word ?

  1. F6
  2. F7
  3. F8
  4. F9

104. In which type of computer, data are represented as discrete signals?

  1. Analog computer
  2. Digital Computer
  3. Both a and b
  4. Hybrid Computer

105. Light pen & Joystick are

  1. Algorithm
  2. Input devices
  3. Output devices
  4. Portals

106. Switching device of the fifth-generation computer is

  1. VLSI
  2. IC
  3. Transistor
  4. Vacuum Tube

107. The scrambling of code is known as

  1. Password proofing
  2. Scrambling
  3. A firewall
  4. Encryption

108. Malicious Software is known as

  1. Badware
  2. Malware
  3. Maliciousware
  4. Illegalware

109. Computers manipulate data in many ways and this manipulation is called

  1. Upgrading
  2. Processing
  3. Batching
  4. Utilizing

110. What is the other name for programmed chip?

  1. RAM
  2. ROM
  3. LSIC
  4. PROM

111. Father of ‘c’ programming language is

  1. Dennis Ritchie
  2. John Keenly
  3. Thomas Kurtz
  4. Bill Gates

112. An error in software or hardware is called a bug. What is the alternative computer jargon for it?

  1. Leech
  2. Squid
  3. Slug
  4. Glitch

113. A computer cannot ‘Boot’ if does not have the

  1. Compiler
  2. Loader
  3. Operating system
  4. Assembler

114. Junk E-mail is also called

  1. Spool
  2. Sniffer script
  3. Spoof
  4. Spam

115. The first computers were programmed using

  1. Assembly language
  2. Machine language
  3. Source code
  4. Object code

116. Shell is the exclusive feature of

  1. Application software
  2. DOS
  3. UNIX
  4. System software

117. An IP address is ………….. bits.

  1. 24
  2. 32
  3. 48
  4. None of these

118. A repeater recognizes …………………….. layer addresses.

  1. Data link
  2. Network
  3. Transport
  4. None of these

119. Token Bus is physically configured like

  1. Ethernet
  2. Token ring
  3. FDDI
  4. All of these

120. A computer network permits sharing of

  1. Resources
  2. Information
  3. Both a and b
  4. None of these

Read the next part:  ।।  Part-3 ।।  Part-1 ।।

Read also: 

  1. Solved Paper Superintendent of Jails 2021
  2. Solved Paper Panchayat Secretary Exam 2021 – HPU Shimla
  3. Solved Paper JOA IT 2021 – Dr. YSP University
  4. Solved Paper Clerk Exam 2021 – HPSSC Hamipur
  5. Solved Paper JOA IT – HPCSKV Palampur
  6. Solved Paper Traffic Inspector 2021
  7. Solved Paper JOA Accounts 2021
  8. Solved Paper Staff Nurse 2021
  9. Junior Office Assistant (IT) Paper 2021
  10. Senior Scientific Officer Paper 2021
  11. Hotel Inspector Paper 2021

4 thoughts on “Solved Paper Data Entry Operator 2021 [Part-2] – HPSSC Hamirpur

    1. HP General Studies Post author

      Kindly let us know which answer are wrong. We’ll make corrections.

      Reply
    1. HP General Studies Post author

      Kindly let us know which answer are wrong. We’ll make corrections.

      Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

The maximum upload file size: 2 MB. You can upload: image. Links to YouTube, Facebook, Twitter and other services inserted in the comment text will be automatically embedded. Drop file here