HPRCA JOA IT Mock Test Series – Set 1

Total Questions: 30 | Duration: 30 Minutes | Topics: Computer Fundamentals, OS, Networking, MS Office, Programming.

Questions

  1. Which unit of the CPU is responsible for coordinating the activities of all other computer components?
    • (A) Arithmetic Logic Unit (ALU)
    • (B) Control Unit (CU)
    • (C) Register Unit
    • (D) Memory Unit
  2. In C language, what is the maximum value that can be stored in a ‘signed short’ integer if it occupies 2 bytes?
    • (A) 65535
    • (B) 32768
    • (C) 32767
    • (D) 16383
  3. What is the decimal equivalent of the binary number (110101)?
    • (A) 53
    • (B) 45
    • (C) 61
    • (D) 37
  4. Which layer of the OSI model is responsible for routing data packets between different networks?
    • (A) Data Link Layer
    • (B) Transport Layer
    • (C) Network Layer
    • (D) Session Layer
  5. In MS Excel, which function is used to count the number of cells that contain numbers within a range?
    • (A) COUNTA
    • (B) COUNT
    • (C) COUNTIF
    • (D) COUNTBLANK
  6. Which of the following is a non-volatile memory that can be electrically erased and reprogrammed?
    • (A) RAM
    • (B) ROM
    • (C) EEPROM
    • (D) SRAM
  7. The process of loading an operating system into the computer’s main memory is called:
    • (A) Processing
    • (B) Booting
    • (C) Formatting
    • (D) Swapping
  8. Which protocol is primarily used for securely transferring files over the internet?
    • (A) HTTP
    • (B) FTP
    • (C) SFTP
    • (D) SMTP
  9. In C programming, which operator is used to access the address of a variable?
    • (A) *
    • (B) &
    • (C) ->
    • (D) .
  1. Which type of printer uses a fuser assembly to bond toner to the paper?
    • (A) Inkjet
    • (B) Dot Matrix
    • (C) Laser
    • (D) Thermal
  2. What is the full form of DHCP in networking?
    • (A) Dynamic Host Control Protocol
    • (B) Digital Host Configuration Protocol
    • (C) Dynamic Host Configuration Protocol
    • (D) Domain Host Control Protocol
  3. Which of the following is NOT a valid cell reference in MS Excel?
    • (A) $A1
    • (B) A$1
    • (C) $A$1
    • (D) A1$
  4. In the context of Operating Systems, what does ‘SPOOLING’ stand for?
    • (A) Simultaneous Peripheral Operation On-Line
    • (B) System Peripheral Output Off-Line
    • (C) Serial Peripheral Operation On-Line
    • (D) Software Peripheral Output On-Line
  5. Which shortcut key is used to ‘Undo’ the last action in MS Word?
    • (A) Ctrl + Y
    • (B) Ctrl + Z
    • (C) Ctrl + U
    • (D) Ctrl + X
  6. What is the port number used by the HTTPS protocol?
    • (A) 80
    • (B) 443
    • (C) 21
    • (D) 25
  7. Which generation of computers used VLSI (Very Large Scale Integration) technology?
    • (A) Second
    • (B) Third
    • (C) Fourth
    • (D) Fifth
  8. A CPU’s ‘Clock Speed’ is generally measured in:
    • (A) MHz or GHz
    • (B) MB or GB
    • (C) Nanoseconds
    • (D) MIPS
  9. Which SQL command is used to remove all records from a table but keep the structure?
    • (A) DELETE
    • (B) DROP
    • (C) TRUNCATE
    • (D) REMOVE
  10. In C, which data type is used to store a single character?
    • (A) string
    • (B) char
    • (C) varchar
    • (D) chr
  11. Which device operates at the Physical Layer of the OSI model?
    • (A) Bridge
    • (B) Switch
    • (C) Hub
    • (D) Router
  12. What is the shortcut key to insert a Hyperlink in MS Word?
    • (A) Ctrl + H
    • (B) Ctrl + K
    • (C) Ctrl + L
    • (D) Ctrl + M
  13. In Python, which keyword is used to define a function?
    • (A) function
    • (B) define
    • (C) def
    • (D) func
  14. Which memory acts as a high-speed buffer between the CPU and Main Memory?
    • (A) Virtual Memory
    • (B) Cache Memory
    • (C) Secondary Memory
    • (D) Flash Memory
  15. A ‘Worm’ in computer security is a type of:
    • (A) Antivirus
    • (B) Self-replicating malware
    • (C) Hardware error
    • (D) Networking tool
  16. What is the base of the Hexadecimal number system?
    • (A) 2
    • (B) 8
    • (C) 10
    • (D) 16
  17. Which CSS property is used to change the background color of an element?
    • (A) color
    • (B) bg-color
    • (C) background-color
    • (D) bgcolor
  18. The ‘Kernel’ is the central part of:
    • (A) MS Office
    • (B) Operating System
    • (C) Application Software
    • (D) Database Management System
  19. In MS PowerPoint, which view is used to rearrange slides easily?
    • (A) Normal View
    • (B) Slide Sorter View
    • (C) Slide Show View
    • (D) Notes Page View
  20. Which of the following is an example of an interpreted language?
    • (A) C
    • (B) C++
    • (C) Python
    • (D) Java (bytecode compilation excluded)
  21. What is the size of an IPv4 address?
    • (A) 32 bits
    • (B) 64 bits
    • (C) 128 bits
    • (D) 16 bits

Answer Key with Detailed Solutions

  1. (B) Control Unit (CU): It acts as the “brain within the brain,” managing the flow of data between the CPU and other devices.
  2. (C) 32767: A 2-byte signed integer range is $-2^{15}$ to $2^{15}-1$. $32768-1 = 32767$.
  3. (A) 53: $(1 \times 2^5) + (1 \times 2^4) + (0 \times 2^3) + (1 \times 2^2) + (0 \times 2^1) + (1 \times 2^0) = 32 + 16 + 4 + 1 = 53$.
  4. (C) Network Layer: This layer handles logical addressing (IP) and determines the best path for data.
  5. (B) COUNT: COUNT only counts numbers; COUNTA counts any non-empty cell.
  6. (C) EEPROM: Electrically Erasable Programmable Read-Only Memory.
  7. (B) Booting: The initial set of operations that a computer system performs when it is switched on.
  8. (C) SFTP: Secure File Transfer Protocol (uses SSH for security).
  9. (B) &: The address-of operator returns the memory location of its operand.
  10. (C) Laser: The fuser unit uses heat and pressure to melt toner into the paper fibers.
  11. (C) Dynamic Host Configuration Protocol: Automatically assigns IP addresses to devices on a network.
  12. (D) A1$: Excel uses $ before the column/row to lock it (e.g., $A$1). A1$ is invalid.
  13. (A) Simultaneous Peripheral Operation On-Line: A process where data is sent to a buffer (like a printer queue).
  14. (B) Ctrl + Z: Standard shortcut for Undo across most Windows applications.
  15. (B) 443: Standard port for secure web traffic; 80 is for standard HTTP.
  16. (C) Fourth: 1st (Vacuum Tubes), 2nd (Transistors), 3rd (ICs), 4th (VLSI).
  17. (A) MHz or GHz: Megahertz or Gigahertz (billions of cycles per second).
  18. (C) TRUNCATE: TRUNCATE is a DDL command that clears data faster than DELETE (DML).
  19. (B) char: Used for single characters like ‘A’ or ‘1’.
  20. (C) Hub: Hubs broadcast signals to all ports at the Physical layer. Switches work at the Data Link layer.
  21. (B) Ctrl + K: Direct shortcut to open the ‘Insert Hyperlink’ dialog.
  22. (C) def: Short for “define”.
  23. (B) Cache Memory: Extremely fast memory used to store frequently accessed data by the CPU.
  24. (B) Self-replicating malware: Unlike viruses, worms do not need to attach to a host program to spread.
  25. (D) 16: Uses digits 0-9 and letters A-F.
  26. (C) background-color: Correct syntax for CSS styling.
  27. (B) Operating System: The bridge between hardware and application software.
  28. (B) Slide Sorter View: Shows thumbnails of all slides for easy reordering.
  29. (C) Python: Python code is executed line-by-line by an interpreter.
  30. (A) 32 bits: Represented as four octets (e.g., 192.168.1.1).

Leave a Reply

Your email address will not be published. Required fields are marked *