Ch. 14 (Part A) Rkcl Online Exam English {Cyber Security}

Right now the RSCIT Online Test of Rkcl Online Exam English will be conducted in which there will be total 35 questions. This RSCIT Online Test is very important for your upcoming exams.

Cyber Security Part A, Rkcl Online Exam English, Cyber Security Rkcl Online Exam English,

Hello! 🙏

how are you?

I'm just fine.

Today I have brought for you Chapter 14 Cyber Security Rkcl Online Exam English, Part A.

In which we will do online test of 35 important questions of Cyber Security and check ourselves whether we have been able to qualify in RSCIT exam or not.

Don't get carried away by just reading the Rkcl Online Exam English.

We can confidently say that if you finish the entire series of this RSCIT Online Test well, then no one can stop you from scoring good marks in RSCIT Exam.

Nowadays questions are asked by altering the RSCIT exam, so you are requested to read and understand all the questions of this Rkcl Online Exam English carefully and take the online test.

Rkcl Online Exam English

Q. 1. If any apps or programs are opened, you click on the button to switch between the opened apps or programs in Windows 10?
A. Cortana
B. Windows Store
C. Microsoft Edge
D. Task bar

Q. 2. What is meant by Inbox in Gmail?
A. Location where e-mails received are kept
B. Location where sent e-mails are kept
C. Location where deleted e-mails are kept
D. Location where spam e-mails are kept

Q. 3. _______ portal is used for railway services?

Q. 4. Which of the following is not an example of an operating system?
A. Android –android
B. windows -windows
C. GPS – Gps
D. Linux - Linux

Q. 5. If we want to search for a job, then which website is most useful?

Q. 6. What are the uses of System Restore in Windows 10?
A. To restore your computer to a point in time before the problem starts
B. For making online payment through banks
C. To collect population data using Bhamashah Yojana Android App
D. To send an instant message using WhatsApp

Q. 7. Files with _______ file extension cannot be sent using Gmail?
A. .pdf
B. .doc
C. .ppt
D. .exe

Q. 8. _______ is used to find the path between two places?
A. .Share it
B. Google Maps
C. Rajasthan Contact
D. E-Mitra

Q. 9. What is the correct classification of computer on the basis of size, storage, capacity and performance?
A. Supercomputers, Mainframe computers, Mini computers and Microcomputers
B. Windows machine, Mac machine, Google machine
C. System software and application software
D. Keyboard, joystick, digital camera and modem

Q. 10. What is the meaning of letter S in Https?
A. Social
B. Safe
C. System
D. Secure

Q. 11. Select the correct examples of mobile wallet from the following?
A. User ID, Password and OTP
B. Debit Card, Credit Card and Internet Banking
C. Paytm, Freecharge, and PhonePe
D. Google Drive, OneDrive, and Raj-e-Wallet

Q. 12. Which formula is used to find the length of a text string in MS Excel 2010?
A. Lower
B. Upper
C. Len
D. Round

Q. 13. Which of the following are types of cyber threats?
A. Virus, Trojan Horse, Spyware
B. Chrome, Firefox, Edge
C. Playstore, Apple Store, Windows Store
D. Http, Https, Ftp

Q. 14. Which of the following printers spray ink from the printer head to print a document or image?
A. Modem
B. Line Printer
C. Laser Printer
D. None of the above

Q. 15. Which option is most suitable for online submission of student fee in university?
A. Debit Card
B. Aadhar Card
C. Family card
D. Ration Card

Q. 16. Why do we use cache memory in computer system?
A. It uses optical and magnetic system for data storage
B. It takes less access time than main memory
C. It has higher storage capacity than secondary memory
D. It stores data permanently

Q. 17. _______ is popularly used for e-mail purposes?
A. MS Word
B. MS Excel
C. MS Powerpoint
D. MS Outlook

Q. 18. Statement 1: Homework for school, children's entertainment, social media etc. What are some uses of computer at home? Statement 2: Smart class, online education, digital library etc. are some of the uses of computer in education?
A. Statement 1 and Statement 2 both are correct
B. Statement 1 and Statement 2 both are wrong
C. Statement 1 is true and Statement 2 is false
D. Statement 1 is false and Statement 2 is true

Q. 19. _______ shows the page number, word count language of the document in MS Word 2010?
A. Title bar
B. Column chart
C. Orientation
D. Printlayout

Q. 20. Which of the following is an example of malware?
A. spyware
B. Virus
C. Tarzan Horse
D. All of the above

Q. 21. Which of the following type of website should not enter your personal information?
A. Websites that do not have https:// at the beginning
B. Websites that do not have a padlock, which do not have https:// at the beginning of their address
C. Websites that do not have a padlock
D. None of the above

Q. 22. Which of the following software spy on your computer and exchange information related to you?
A. Tarzan Horse
B. Virus
C. spyware
D. All of the above

Q. 23. Which of the following is not a function of malware?
A. Destroying data from computer
B. Prevent theft of data from computer
C. Recovering data from computer
D. None of the above

Q. 24. Which of the following is not an example of malware?
A. Torgen Horse
B. Spyware
C. Antivirus
D. Virus

Q. 25. Which of the following type of cyber attack takes you to another website instead of the desired one?
A. Dns Poisoning
B. Phishing
C. Session Hijack
D. All of the above

Q. 26. Which of the following are types of cyber attacks?
A. Browsing
B. Phishing
C. Searching
D. All of the above

Q. 27. Which of the following is a cyber attack?
A. Password Attack
B. Phishing
C. Tarzan Horse
D. All of the above

Q. 28. The process of writing data (like music, photos, documents etc.) on CD or DVD is usually called?
A. Firing
B. Burning
C. Smoking
D. watering

Q. 29. What is the full form of Smtp?
A. Simple Mail Transfer Protocol
B. Similar Mail Transfer Protocol
C. Same Money Transfer Protocol
D. Simple Money Transfer Procedure

Q. 30. Which command is used to see how the document looks before the document is printed?
A. File preview
B. Pre-print
C. Print preview
D. Standard Preview

Q. 31. Uses encryption techniques to provide proof of original and unmodified documentation?
A. Digital Signature
B. Firewall
C. Malware
D. Trojan horse

Q. 32. In MS-Word 2010 _______ select a space or text that you recognize for name and future reference?
A. Bookmark
B. Clip art
C. Format Painter
D. Undo

Q. 33. Which of the following comes under Income Tax Services?
A. PAN card application and updation
B. Ticket Booking Services
C. Ticket Cancellation Services
D. Online refill booking

Q. 34. Choose a valid example of an email address from the following options?
B. Google

Q. 35. Which port allows television/projector to receive and display computer generated image?
A. Vga
B. Hdmi
C. A or B Both options are correct
D. None of the above

Oh wow!😊

You have already done online test of all the questions of Rkcl Online Exam English.

Now do one more thing,

Quickly open the Conversation Box given below and write 'RSCIT Best Test' in it so that we also know how many of you students have done this RSCIT Online Test well.

and yes! Do SHARE this Rkcl Online Exam English with your other RSCIT friends so that you get his blessings and we get lots of happiness.

Just take some rest.

And after that by clicking on the button given below, you will definitely join other tests of RSCIT Online Test.


If you find any error in any query then please do let us know and help us to improve this small effort of ours.

Have a nice day, see you again!

Jai Rajasthan...💪