JKSSB SI Sample Question Paper: Computer Knowledge (100 Questions)

 


JKSSB SI Sample Question Paper: Computer Knowledge (100 Questions)

Instructions: Each question has four options (A, B, C, D). Select the correct answer. This is a sample for practice purposes only.


Computer Basics (1-25)

  1. What is the full form of CPU?
    A) Central Processing Unit
    B) Control Processing Unit
    C) Central Program Unit
    D) Control Program Unit
    Answer: A
  2. Which component is known as the "brain" of the computer?
    A) Monitor
    B) CPU
    C) Keyboard
    D) Hard Disk
    Answer: B
  3. Which of the following is an input device?
    A) Printer
    B) Monitor
    C) Mouse
    D) Speaker
    Answer: C
  4. Which device is used to produce a hard copy of a document?
    A) Scanner
    B) Printer
    C) Keyboard
    D) Mouse
    Answer: B
  5. What is the main function of the ALU in a CPU?
    A) Stores data
    B) Performs arithmetic and logical operations
    C) Controls input/output devices
    D) Manages memory
    Answer: B
  6. Which type of memory is volatile and loses data when the power is turned off?
    A) ROM
    B) RAM
    C) Hard Disk
    D) Flash Drive
    Answer: B
  7. What does ROM stand for?
    A) Read-Only Memory
    B) Random Output Memory
    C) Read-Output Memory
    D) Random-Only Memory
    Answer: A
  8. Which of the following is a backup device?
    A) RAM
    B) External Hard Drive
    C) CPU
    D) Monitor
    Answer: B
  9. What is the purpose of a USB port?
    A) To connect external devices
    B) To cool the CPU
    C) To store permanent data
    D) To display output
    Answer: A
  10. Which port is used to connect a monitor to a computer?
    A) USB Port
    B) HDMI Port
    C) Ethernet Port
    D) Audio Port
    Answer: B
  11. What is the function of Windows Explorer?
    A) To browse the internet
    B) To manage files and folders
    C) To edit documents
    D) To play media files
    Answer: B
  12. Which keyboard shortcut is used to copy selected text?
    A) Ctrl + V
    B) Ctrl + C
    C) Ctrl + X
    D) Ctrl + Z
    Answer: B
  13. What does the shortcut Ctrl + Z do?
    A) Undo the last action
    B) Redo the last action
    C) Copy the selected text
    D) Paste the copied text
    Answer: A
  14. Which key is used to permanently delete a file without sending it to the Recycle Bin?
    A) Delete
    B) Shift + Delete
    C) Ctrl + Delete
    D) Alt + Delete
    Answer: B
  15. What is the primary storage device in a computer?
    A) Hard Disk Drive (HDD)
    B) RAM
    C) USB Drive
    D) CD-ROM
    Answer: A
  16. What is the unit of measurement for computer memory?
    A) Hertz
    B) Byte
    C) Watt
    D) Volt
    Answer: B
  17. How many bits are there in a byte?
    A) 4
    B) 8
    C) 16
    D) 32
    Answer: B
  18. Which of the following is a secondary storage device?
    A) RAM
    B) ROM
    C) SSD
    D) Cache Memory
    Answer: C
  19. What does BIOS stand for?
    A) Basic Input/Output System
    B) Binary Input/Output System
    C) Basic Internal Operating System
    D) Binary Internal Operating System
    Answer: A
  20. Which of the following is NOT an output device?
    A) Monitor
    B) Printer
    C) Speaker
    D) Keyboard
    Answer: D
  21. What is the purpose of the Control Unit (CU) in the CPU?
    A) Performs calculations
    B) Stores data
    C) Directs the operation of the processor
    D) Displays output
    Answer: C
  22. Which device is used to connect a computer to a network?
    A) Modem
    B) Monitor
    C) Keyboard
    D) Printer
    Answer: A
  23. What is the function of cache memory?
    A) To store permanent data
    B) To speed up data access between CPU and RAM
    C) To display output
    D) To connect to the internet
    Answer: B
  24. Which of the following is a type of computer memory organization?
    A) Sequential Access
    B) Random Access
    C) Both A and B
    D) None of the above
    Answer: C
  25. What does the "Recycle Bin" in Windows do?
    A) Permanently deletes files
    B) Stores deleted files temporarily
    C) Backs up files automatically
    D) Compresses files
    Answer: B

Software (26-50)

  1. What is the default operating system for most personal computers?
    A) Linux
    B) macOS
    C) Windows
    D) Unix
    Answer: C
  2. Which of the following is NOT a feature of the Windows Operating System?
    A) Taskbar
    B) Start Menu
    C) Terminal
    D) File Explorer
    Answer: C
  3. What is Microsoft Word primarily used for?
    A) Creating spreadsheets
    B) Word processing
    C) Creating presentations
    D) Managing databases
    Answer: B
  4. Which Microsoft Office application is used to create presentations?
    A) MS Word
    B) MS Excel
    C) MS PowerPoint
    D) MS Access
    Answer: C
  5. What is the file extension for a Microsoft Word document?
    A) .xlsx
    B) .docx
    C) .pptx
    D) .txt
    Answer: B
  6. Which of the following is a spreadsheet application?
    A) MS Word
    B) MS Excel
    C) MS PowerPoint
    D) MS Outlook
    Answer: B
  7. What is the file extension for a Microsoft Excel file?
    A) .docx
    B) .xlsx
    C) .pptx
    D) .mdb
    Answer: B
  8. In MS Word, which tab contains the "Font" settings?
    A) Home
    B) Insert
    C) Design
    D) View
    Answer: A
  9. What does the "Slide Sorter" view in MS PowerPoint allow you to do?
    A) Edit slide content
    B) Rearrange slides
    C) Play the presentation
    D) Add animations
    Answer: B
  10. Which feature in MS Excel is used to perform calculations?
    A) Formula
    B) Chart
    C) Pivot Table
    D) Filter
    Answer: A
  11. In MS Word, what is the shortcut to bold text?
    A) Ctrl + B
    B) Ctrl + I
    C) Ctrl + U
    D) Ctrl + S
    Answer: A
  12. What is the default alignment of text in MS Word?
    A) Center
    B) Right
    C) Left
    D) Justified
    Answer: C
  13. Which tab in MS Excel contains the "Sort & Filter" option?
    A) Home
    B) Data
    C) Insert
    D) View
    Answer: B
  14. What is the purpose of the "Slide Master" in MS PowerPoint?
    A) To create new slides
    B) To apply a consistent design to all slides
    C) To add animations
    D) To play the presentation
    Answer: B
  15. Which of the following is NOT a Microsoft Office application?
    A) MS Word
    B) MS Excel
    C) MS Paint
    D) MS PowerPoint
    Answer: C
  16. What does the "Print Preview" option in MS Word show?
    A) The document's word count
    B) How the document will look when printed
    C) The document's formatting errors
    D) The document's file size
    Answer: B
  17. Which feature in MS Excel allows you to visualize data?
    A) Formula
    B) Chart
    C) Filter
    D) Sort
    Answer: B
  18. What is the shortcut to save a document in MS Word?
    A) Ctrl + S
    B) Ctrl + P
    C) Ctrl + C
    D) Ctrl + V
    Answer: A
  19. In MS PowerPoint, what is the default file extension for a presentation?
    A) .docx
    B) .xlsx
    C) .pptx
    D) .txt
    Answer: C
  20. Which tab in MS Word contains the "Mail Merge" option?
    A) Home
    B) Insert
    C) Mailings
    D) Review
    Answer: C
  21. What is the purpose of the "Thesaurus" in MS Word?
    A) To check spelling
    B) To find synonyms
    C) To change font styles
    D) To insert images
    Answer: B
  22. Which feature in MS Excel is used to summarize large data sets?
    A) Chart
    B) Pivot Table
    C) Formula
    D) Filter
    Answer: B
  23. What does the "F5" key do in MS PowerPoint?
    A) Starts the presentation from the first slide
    B) Saves the presentation
    C) Inserts a new slide
    D) Deletes a slide
    Answer: A
  24. Which application is used to manage emails in Microsoft Office?
    A) MS Word
    B) MS Excel
    C) MS Outlook
    D) MS PowerPoint
    Answer: C
  25. What is the purpose of the "Track Changes" feature in MS Word?
    A) To monitor edits in a document
    B) To count words
    C) To insert comments
    D) To change the font
    Answer: A

Internet and E-mail (51-75)

  1. What does "www" stand for in a website address?
    A) World Wide Web
    B) World Web Wide
    C) Web Wide World
    D) Wide Web World
    Answer: A
  2. Which of the following is a web browser?
    A) Microsoft Word
    B) Google Chrome
    C) Windows Explorer
    D) Notepad
    Answer: B
  3. What is the process of transferring files from the internet to your computer called?
    A) Uploading
    B) Downloading
    C) Browsing
    D) Searching
    Answer: B
  4. What is the process of transferring files from your computer to the internet called?
    A) Downloading
    B) Uploading
    C) Browsing
    D) Searching
    Answer: B
  5. What does URL stand for?
    A) Uniform Resource Locator
    B) Universal Resource Link
    C) Uniform Resource Link
    D) Universal Resource Locator
    Answer: A
  6. Which protocol is used to send emails?
    A) HTTP
    B) FTP
    C) SMTP
    D) TCP
    Answer: C
  7. What does HTTP stand for?
    A) HyperText Transfer Protocol
    B) HyperText Transmission Protocol
    C) HighText Transfer Protocol
    D) HyperTransfer Text Protocol
    Answer: A
  8. Which of the following is an email service provider?
    A) Google Chrome
    B) Gmail
    C) Microsoft Word
    D) Windows Explorer
    Answer: B
  9. What is the purpose of the "CC" field in an email?
    A) To send a copy to additional recipients
    B) To hide recipients
    C) To attach files
    D) To mark the email as urgent
    Answer: A
  10. What does "BCC" stand for in an email?
    A) Blind Carbon Copy
    B) Basic Carbon Copy
    C) Blind Copy Carbon
    D) Basic Copy Carbon
    Answer: A
  11. Which of the following is a search engine?
    A) Gmail
    B) Google
    C) Outlook
    D) Yahoo Mail
    Answer: B
  12. What is e-banking?
    A) Sending emails online
    B) Conducting banking transactions online
    C) Browsing the web
    D) Uploading files
    Answer: B
  13. Which of the following is a secure protocol for browsing?
    A) HTTP
    B) FTP
    C) HTTPS
    D) SMTP
    Answer: C
  14. What does the "S" in HTTPS stand for?
    A) Secure
    B) System
    C) Simple
    D) Standard
    Answer: A
  15. What is the purpose of a hyperlink on a webpage?
    A) To play videos
    B) To link to another webpage or resource
    C) To download files
    D) To close the browser
    Answer: B
  16. Which of the following is NOT an email client?
    A) Microsoft Outlook
    B) Gmail
    C) Mozilla Thunderbird
    D) Google Chrome
    Answer: D
  17. What does "phishing" refer to in the context of the internet?
    A) Searching for websites
    B) A type of online scam to steal personal information
    C) Downloading files
    D) Uploading files
    Answer: B
  18. What is the purpose of a bookmark in a web browser?
    A) To save a webpage for later access
    B) To delete a webpage
    C) To refresh a webpage
    D) To close the browser
    Answer: A
  19. Which key is used to refresh a webpage in most browsers?
    A) F1
    B) F5
    C) F10
    D) F12
    Answer: B
  20. What is the default homepage in most web browsers?
    A) A search engine like Google
    B) An email service
    C) A social media site
    D) A blank page
    Answer: A
  21. What does "Incognito Mode" in a browser do?
    A) Saves all browsing history
    B) Does not save browsing history
    C) Automatically downloads files
    D) Blocks all websites
    Answer: B
  22. Which of the following is a feature of e-banking?
    A) Sending emails
    B) Online fund transfer
    C) Browsing social media
    D) Playing games
    Answer: B
  23. What does the "Trash" folder in an email account store?
    A) Sent emails
    B) Deleted emails
    C) Draft emails
    D) Spam emails
    Answer: B
  24. What is the purpose of the "Spam" folder in an email account?
    A) To store important emails
    B) To store junk or unwanted emails
    C) To store sent emails
    D) To store drafts
    Answer: B
  25. Which of the following is a common file format for email attachments?
    A) .pdf
    B) .exe
    C) .html
    D) .css
    Answer: A

Networking and Cybersecurity (76-100)

  1. What does LAN stand for?
    A) Local Area Network
    B) Large Area Network
    C) Local Access Network
    D) Large Access Network
    Answer: A
  2. Which device is used to connect multiple computers in a network?
    A) Switch
    B) Monitor
    C) Keyboard
    D) Printer
    Answer: A
  3. What does WAN stand for?
    A) Wide Area Network
    B) Wireless Access Network
    C) Wide Access Network
    D) Wireless Area Network
    Answer: A
  4. Which protocol is used to transfer files over the internet?
    A) HTTP
    B) FTP
    C) SMTP
    D) TCP
    Answer: B
  5. What does IP stand for in networking?
    A) Internet Protocol
    B) Internal Protocol
    C) Internet Provider
    D) Internal Provider
    Answer: A
  6. What is a firewall?
    A) A device to cool the CPU
    B) A security system to protect a network
    C) A type of virus
    D) A web browser
    Answer: B
  7. Which of the following is a network security threat?
    A) Virus
    B) Monitor
    C) Keyboard
    D) Printer
    Answer: A
  8. What is a computer virus?
    A) A hardware component
    B) A malicious program that harms a computer
    C) A type of web browser
    D) A networking device
    Answer: B
  9. What does a Trojan do?
    A) Protects the computer
    B) Disguises itself as a legitimate program to harm the system
    C) Speeds up the computer
    D) Manages email accounts
    Answer: B
  10. What is a worm in the context of cybersecurity?
    A) A type of hardware
    B) A self-replicating malicious program
    C) A web browser
    D) A networking protocol
    Answer: B
  11. What is hacking?
    A) Unauthorized access to a computer system
    B) Installing software
    C) Browsing the internet
    D) Sending emails
    Answer: A
  12. Which of the following is a preventive measure against viruses?
    A) Installing antivirus software
    B) Opening unknown email attachments
    C) Sharing passwords
    D) Disabling the firewall
    Answer: A
  13. What does a strong password typically include?
    A) Only letters
    B) A combination of letters, numbers, and special characters
    C) Your name
    D) A single word
    Answer: B
  14. What is the purpose of a VPN?
    A) To create a secure connection over the internet
    B) To speed up the computer
    C) To manage email accounts
    D) To play games
    Answer: A
  15. What does "phishing" attempt to steal?
    A) Hardware components
    B) Personal information like passwords
    C) Network cables
    D) Computer memory
    Answer: B
  16. What is a router used for in networking?
    A) To connect devices to the internet
    B) To print documents
    C) To store data
    D) To display output
    Answer: A
  17. Which of the following is a common antivirus software?
    A) Google Chrome
    B) Norton
    C) Microsoft Word
    D) Windows Explorer
    Answer: B
  18. What does "malware" stand for?
    A) Malicious Software
    B) Main Software
    C) Malfunctioning Software
    D) Manual Software
    Answer: A
  19. What is the purpose of two-factor authentication (2FA)?
    A) To slow down login
    B) To add an extra layer of security
    C) To disable the account
    D) To share passwords
    Answer: B
  20. Which of the following should you avoid to prevent cybersecurity threats?
    A) Using antivirus software
    B) Clicking on unknown links
    C) Updating software regularly
    D) Using strong passwords
    Answer: B
  21. What does a "spyware" do?
    A) Protects the computer
    B) Secretly collects user information
    C) Speeds up the system
    D) Manages network traffic
    Answer: B
  22. What is a common sign of a computer virus infection?
    A) Faster performance
    B) Slow system performance
    C) More storage space
    D) Better graphics
    Answer: B
  23. What does the term "bandwidth" refer to in networking?
    A) The speed of the CPU
    B) The amount of data that can be transferred over a network
    C) The size of the monitor
    D) The capacity of RAM
    Answer: B
  24. What is the purpose of a network protocol?
    A) To define rules for data communication
    B) To store data
    C) To display output
    D) To cool the system
    Answer: A
  25. Which of the following is a good cybersecurity practice?
    A) Sharing passwords with friends
    B) Regularly updating software
    C) Disabling antivirus software
    D) Downloading files from unknown sources
    Answer: B

Notes:

  • This sample paper is designed to align with the JKSSB SI syllabus for Computer Knowledge, covering all specified topics in a balanced manner.

Comments

Popular posts from this blog

JKSSB Sub-Inspector Sample Paper :- Full length 100 questions.

Important Lakes and Wetlands in Jammu and Kashmir (J&K):- jkssb study material.

Important Mountain Passes in India and j&k :- Jkssb study material.