{"id":1234,"date":"2026-02-03T02:52:15","date_gmt":"2026-02-03T02:52:15","guid":{"rendered":"https:\/\/vracademy.in\/?p=1234"},"modified":"2026-02-03T02:52:16","modified_gmt":"2026-02-03T02:52:16","slug":"hprca-joa-it-mock-test-series","status":"publish","type":"post","link":"https:\/\/vracademy.in\/?p=1234","title":{"rendered":"HPRCA JOA IT Mock Test Series"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">HPRCA JOA IT Mock Test Series &#8211; Set 1<\/h1>\n\n\n\n<p><strong>Total Questions:<\/strong> 30 | <strong>Duration:<\/strong> 30 Minutes | <strong>Topics:<\/strong> Computer Fundamentals, OS, Networking, MS Office, Programming.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Questions<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Which unit of the CPU is responsible for coordinating the activities of all other computer components?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Arithmetic Logic Unit (ALU)<\/li>\n\n\n\n<li>(B) Control Unit (CU)<\/li>\n\n\n\n<li>(C) Register Unit<\/li>\n\n\n\n<li>(D) Memory Unit<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>In C language, what is the maximum value that can be stored in a &#8216;signed short&#8217; integer if it occupies 2 bytes?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) 65535<\/li>\n\n\n\n<li>(B) 32768<\/li>\n\n\n\n<li>(C) 32767<\/li>\n\n\n\n<li>(D) 16383<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>What is the decimal equivalent of the binary number (110101)?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) 53<\/li>\n\n\n\n<li>(B) 45<\/li>\n\n\n\n<li>(C) 61<\/li>\n\n\n\n<li>(D) 37<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which layer of the OSI model is responsible for routing data packets between different networks?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Data Link Layer<\/li>\n\n\n\n<li>(B) Transport Layer<\/li>\n\n\n\n<li>(C) Network Layer<\/li>\n\n\n\n<li>(D) Session Layer<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>In MS Excel, which function is used to count the number of cells that contain numbers within a range?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) COUNTA<\/li>\n\n\n\n<li>(B) COUNT<\/li>\n\n\n\n<li>(C) COUNTIF<\/li>\n\n\n\n<li>(D) COUNTBLANK<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which of the following is a non-volatile memory that can be electrically erased and reprogrammed?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) RAM<\/li>\n\n\n\n<li>(B) ROM<\/li>\n\n\n\n<li>(C) EEPROM<\/li>\n\n\n\n<li>(D) SRAM<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>The process of loading an operating system into the computer&#8217;s main memory is called:<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Processing<\/li>\n\n\n\n<li>(B) Booting<\/li>\n\n\n\n<li>(C) Formatting<\/li>\n\n\n\n<li>(D) Swapping<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which protocol is primarily used for securely transferring files over the internet?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) HTTP<\/li>\n\n\n\n<li>(B) FTP<\/li>\n\n\n\n<li>(C) SFTP<\/li>\n\n\n\n<li>(D) SMTP<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>In C programming, which operator is used to access the address of a variable?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) *<\/li>\n\n\n\n<li>(B) &amp;<\/li>\n\n\n\n<li>(C) -><\/li>\n\n\n\n<li>(D) .<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5559882624268864\"\n     crossorigin=\"anonymous\"><\/script>\n<!-- horizontal ads -->\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-5559882624268864\"\n     data-ad-slot=\"8631919973\"\n     data-ad-format=\"auto\"\n     data-full-width-responsive=\"true\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Which type of printer uses a fuser assembly to bond toner to the paper?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Inkjet<\/li>\n\n\n\n<li>(B) Dot Matrix<\/li>\n\n\n\n<li>(C) Laser<\/li>\n\n\n\n<li>(D) Thermal<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>What is the full form of DHCP in networking?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Dynamic Host Control Protocol<\/li>\n\n\n\n<li>(B) Digital Host Configuration Protocol<\/li>\n\n\n\n<li>(C) Dynamic Host Configuration Protocol<\/li>\n\n\n\n<li>(D) Domain Host Control Protocol<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which of the following is NOT a valid cell reference in MS Excel?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) $A1<\/li>\n\n\n\n<li>(B) A$1<\/li>\n\n\n\n<li>(C) $A$1<\/li>\n\n\n\n<li>(D) A1$<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>In the context of Operating Systems, what does &#8216;SPOOLING&#8217; stand for?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Simultaneous Peripheral Operation On-Line<\/li>\n\n\n\n<li>(B) System Peripheral Output Off-Line<\/li>\n\n\n\n<li>(C) Serial Peripheral Operation On-Line<\/li>\n\n\n\n<li>(D) Software Peripheral Output On-Line<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which shortcut key is used to &#8216;Undo&#8217; the last action in MS Word?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Ctrl + Y<\/li>\n\n\n\n<li>(B) Ctrl + Z<\/li>\n\n\n\n<li>(C) Ctrl + U<\/li>\n\n\n\n<li>(D) Ctrl + X<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>What is the port number used by the HTTPS protocol?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) 80<\/li>\n\n\n\n<li>(B) 443<\/li>\n\n\n\n<li>(C) 21<\/li>\n\n\n\n<li>(D) 25<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which generation of computers used VLSI (Very Large Scale Integration) technology?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Second<\/li>\n\n\n\n<li>(B) Third<\/li>\n\n\n\n<li>(C) Fourth<\/li>\n\n\n\n<li>(D) Fifth<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>A CPU&#8217;s &#8216;Clock Speed&#8217; is generally measured in:<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) MHz or GHz<\/li>\n\n\n\n<li>(B) MB or GB<\/li>\n\n\n\n<li>(C) Nanoseconds<\/li>\n\n\n\n<li>(D) MIPS<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which SQL command is used to remove all records from a table but keep the structure?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) DELETE<\/li>\n\n\n\n<li>(B) DROP<\/li>\n\n\n\n<li>(C) TRUNCATE<\/li>\n\n\n\n<li>(D) REMOVE<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>In C, which data type is used to store a single character?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) string<\/li>\n\n\n\n<li>(B) char<\/li>\n\n\n\n<li>(C) varchar<\/li>\n\n\n\n<li>(D) chr<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which device operates at the Physical Layer of the OSI model?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Bridge<\/li>\n\n\n\n<li>(B) Switch<\/li>\n\n\n\n<li>(C) Hub<\/li>\n\n\n\n<li>(D) Router<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>What is the shortcut key to insert a Hyperlink in MS Word?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Ctrl + H<\/li>\n\n\n\n<li>(B) Ctrl + K<\/li>\n\n\n\n<li>(C) Ctrl + L<\/li>\n\n\n\n<li>(D) Ctrl + M<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>In Python, which keyword is used to define a function?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) function<\/li>\n\n\n\n<li>(B) define<\/li>\n\n\n\n<li>(C) def<\/li>\n\n\n\n<li>(D) func<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which memory acts as a high-speed buffer between the CPU and Main Memory?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Virtual Memory<\/li>\n\n\n\n<li>(B) Cache Memory<\/li>\n\n\n\n<li>(C) Secondary Memory<\/li>\n\n\n\n<li>(D) Flash Memory<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>A &#8216;Worm&#8217; in computer security is a type of:<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Antivirus<\/li>\n\n\n\n<li>(B) Self-replicating malware<\/li>\n\n\n\n<li>(C) Hardware error<\/li>\n\n\n\n<li>(D) Networking tool<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>What is the base of the Hexadecimal number system?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) 2<\/li>\n\n\n\n<li>(B) 8<\/li>\n\n\n\n<li>(C) 10<\/li>\n\n\n\n<li>(D) 16<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which CSS property is used to change the background color of an element?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) color<\/li>\n\n\n\n<li>(B) bg-color<\/li>\n\n\n\n<li>(C) background-color<\/li>\n\n\n\n<li>(D) bgcolor<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>The &#8216;Kernel&#8217; is the central part of:<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) MS Office<\/li>\n\n\n\n<li>(B) Operating System<\/li>\n\n\n\n<li>(C) Application Software<\/li>\n\n\n\n<li>(D) Database Management System<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>In MS PowerPoint, which view is used to rearrange slides easily?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) Normal View<\/li>\n\n\n\n<li>(B) Slide Sorter View<\/li>\n\n\n\n<li>(C) Slide Show View<\/li>\n\n\n\n<li>(D) Notes Page View<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Which of the following is an example of an interpreted language?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) C<\/li>\n\n\n\n<li>(B) C++<\/li>\n\n\n\n<li>(C) Python<\/li>\n\n\n\n<li>(D) Java (bytecode compilation excluded)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>What is the size of an IPv4 address?<\/strong>\n<ul class=\"wp-block-list\">\n<li>(A) 32 bits<\/li>\n\n\n\n<li>(B) 64 bits<\/li>\n\n\n\n<li>(C) 128 bits<\/li>\n\n\n\n<li>(D) 16 bits<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-5559882624268864\"\n     crossorigin=\"anonymous\"><\/script>\n<!-- horizontal ads -->\n<ins class=\"adsbygoogle\"\n     style=\"display:block\"\n     data-ad-client=\"ca-pub-5559882624268864\"\n     data-ad-slot=\"8631919973\"\n     data-ad-format=\"auto\"\n     data-full-width-responsive=\"true\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"HP JOA IT Preparation \/\/ Most important IT MCQ \/\/HPRCA JOA IT Mock Test \/\/HPRCA JOA IT test series\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/8wqBkrW-yw4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Answer Key with Detailed Solutions<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>(B) Control Unit (CU)<\/strong>: It acts as the &#8220;brain within the brain,&#8221; managing the flow of data between the CPU and other devices.<\/li>\n\n\n\n<li><strong>(C) 32767<\/strong>: A 2-byte signed integer range is $-2^{15}$ to $2^{15}-1$. $32768-1 = 32767$.<\/li>\n\n\n\n<li><strong>(A) 53<\/strong>: $(1 \\times 2^5) + (1 \\times 2^4) + (0 \\times 2^3) + (1 \\times 2^2) + (0 \\times 2^1) + (1 \\times 2^0) = 32 + 16 + 4 + 1 = 53$.<\/li>\n\n\n\n<li><strong>(C) Network Layer<\/strong>: This layer handles logical addressing (IP) and determines the best path for data.<\/li>\n\n\n\n<li><strong>(B) COUNT<\/strong>: <code>COUNT<\/code> only counts numbers; <code>COUNTA<\/code> counts any non-empty cell.<\/li>\n\n\n\n<li><strong>(C) EEPROM<\/strong>: Electrically Erasable Programmable Read-Only Memory.<\/li>\n\n\n\n<li><strong>(B) Booting<\/strong>: The initial set of operations that a computer system performs when it is switched on.<\/li>\n\n\n\n<li><strong>(C) SFTP<\/strong>: Secure File Transfer Protocol (uses SSH for security).<\/li>\n\n\n\n<li><strong>(B) &amp;<\/strong>: The address-of operator returns the memory location of its operand.<\/li>\n\n\n\n<li><strong>(C) Laser<\/strong>: The fuser unit uses heat and pressure to melt toner into the paper fibers.<\/li>\n\n\n\n<li><strong>(C) Dynamic Host Configuration Protocol<\/strong>: Automatically assigns IP addresses to devices on a network.<\/li>\n\n\n\n<li><strong>(D) A1$<\/strong>: Excel uses <code>$<\/code> before the column\/row to lock it (e.g., <code>$A$1<\/code>). <code>A1$<\/code> is invalid.<\/li>\n\n\n\n<li><strong>(A) Simultaneous Peripheral Operation On-Line<\/strong>: A process where data is sent to a buffer (like a printer queue).<\/li>\n\n\n\n<li><strong>(B) Ctrl + Z<\/strong>: Standard shortcut for Undo across most Windows applications.<\/li>\n\n\n\n<li><strong>(B) 443<\/strong>: Standard port for secure web traffic; 80 is for standard HTTP.<\/li>\n\n\n\n<li><strong>(C) Fourth<\/strong>: 1st (Vacuum Tubes), 2nd (Transistors), 3rd (ICs), 4th (VLSI).<\/li>\n\n\n\n<li><strong>(A) MHz or GHz<\/strong>: Megahertz or Gigahertz (billions of cycles per second).<\/li>\n\n\n\n<li><strong>(C) TRUNCATE<\/strong>: <code>TRUNCATE<\/code> is a DDL command that clears data faster than <code>DELETE<\/code> (DML).<\/li>\n\n\n\n<li><strong>(B) char<\/strong>: Used for single characters like &#8216;A&#8217; or &#8216;1&#8217;.<\/li>\n\n\n\n<li><strong>(C) Hub<\/strong>: Hubs broadcast signals to all ports at the Physical layer. Switches work at the Data Link layer.<\/li>\n\n\n\n<li><strong>(B) Ctrl + K<\/strong>: Direct shortcut to open the &#8216;Insert Hyperlink&#8217; dialog.<\/li>\n\n\n\n<li><strong>(C) def<\/strong>: Short for &#8220;define&#8221;.<\/li>\n\n\n\n<li><strong>(B) Cache Memory<\/strong>: Extremely fast memory used to store frequently accessed data by the CPU.<\/li>\n\n\n\n<li><strong>(B) Self-replicating malware<\/strong>: Unlike viruses, worms do not need to attach to a host program to spread.<\/li>\n\n\n\n<li><strong>(D) 16<\/strong>: Uses digits 0-9 and letters A-F.<\/li>\n\n\n\n<li><strong>(C) background-color<\/strong>: Correct syntax for CSS styling.<\/li>\n\n\n\n<li><strong>(B) Operating System<\/strong>: The bridge between hardware and application software.<\/li>\n\n\n\n<li><strong>(B) Slide Sorter View<\/strong>: Shows thumbnails of all slides for easy reordering.<\/li>\n\n\n\n<li><strong>(C) Python<\/strong>: Python code is executed line-by-line by an interpreter.<\/li>\n\n\n\n<li><strong>(A) 32 bits<\/strong>: Represented as four octets (e.g., 192.168.1.1).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>HPRCA JOA IT Mock Test Series &#8211; Set 1 Total Questions: 30 | Duration: 30 Minutes | Topics: Computer Fundamentals, OS, Networking, MS Office, Programming.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1234","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/vracademy.in\/index.php?rest_route=\/wp\/v2\/posts\/1234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vracademy.in\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vracademy.in\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vracademy.in\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vracademy.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1234"}],"version-history":[{"count":1,"href":"https:\/\/vracademy.in\/index.php?rest_route=\/wp\/v2\/posts\/1234\/revisions"}],"predecessor-version":[{"id":1235,"href":"https:\/\/vracademy.in\/index.php?rest_route=\/wp\/v2\/posts\/1234\/revisions\/1235"}],"wp:attachment":[{"href":"https:\/\/vracademy.in\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vracademy.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vracademy.in\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}