21. The following is not a mobile operating system :
(A) Android
(B) Google Play Store
(C) Windows Phone OS
(D) Apple iOS
Show Answer
Hide Answer
22. In Microsoft Excel Sheet, values are stored in a column cells. The number of cells having value greater than 40 can be counted using the function :
(A) LEN
(B) VLOOKUP
(C) COUNT
(D) COUNTIF
Show Answer
Hide Answer
23. The steps to create new chart in Microsoft Excel are :
(A) Delete Date → Select Chart
(B) Insert Chart → Show
(C) Select Data → Insert Tab → Select Chart
(D) Copy Data → Select Shape
Show Answer
Hide Answer
24. To check animation of one slide only in Microsoft PowerPoint, the following feature can be used :
(A) On Click
(B) Preview
(C) Slide Show
(D) Save
Show Answer
Hide Answer
25. For inserting the sound in slide of Microsoft PowerPoint, use :
(A) Slide show followed by next
(B) Smart art graphics followed by slide show
(C) Insert → Audio in media group → Select sound file
(D) Slide show → Insert → Save
Show Answer
Hide Answer
26. You can know the current status of reservation of your e-Ticket:
(A) Using Train Number and Name
(B) Using Station and Train Name
(C) Using PNR Number
(D) Using Train Name
Show Answer
Hide Answer
27. Find the invalid e-Mail address :
(A) abcd.def@yahoo
(B) myname@gmail.com
(C) yourname@gov.in
(D) gname@rediffmail.com
Show Answer
Hide Answer
28. Portal for voter services is :
(A) IRCTC
(B) RSRTC
(C) UIDAI
(D) NVSP
Show Answer
Hide Answer
29. In paragraph formatting, you can:
(A) Align Text
(B) Type Hyperlink
(C) Create a Bookmark
(D) Delete Text
Show Answer
Hide Answer
30. Following is not a cyber threat :
(A) Malware
(B) Phishing
(C) Denial of Service
(D) SSO of Rajasthan
Show Answer
Hide Answer
31 LCD Processor can be connected to PC through :
(A) HDMI Connection
(B) VGA Connection
(C) Both of these
(D) None of these
Show Answer
Hide Answer
32. In MS Outlook 2010 account setting you can set :
(A) Incoming Server POP3
(B) Outgoing Server SMTP
(C) Encryption SSL
(D) All of these
Show Answer
Hide Answer
33. In Indian IT Act, 2000, tampering with computer source code is an offence under Section :
(A) 67
(B) 65
(C) 43
(D) 66
Show Answer
Hide Answer
34. For Mailing Etiquettes, you should :
(A) Check authenticity before forwarding
(B) Use ALL CAPS characters
(C) Use ‘reply to all option frequently
(D) Discuss multiple subjects in one e-mail
Show Answer
Hide Answer
35. The following software can save from cyber threat :
(A) Antivirus software
(B) Trojan Horse
(C) Spyware
(D) Malware
Show Answer
Hide Answer
Leave a Reply