0

UGC NET Paper 1

Description: This test covers topics related to the teaching and research section of UGC NET exam.
Number of Questions: 20
Created by:
Tags: Teaching and research UGC NET Communication People and Environment Higher Education System Information and Communication Technology
Attempted 0/20 Correct 0 Score 0

What are the words that refer to some object, action, or characteristic known as?

  1. Stop words

  2. Function words

  3. Content words

  4. Safeword

  5. Lexicon


Correct Option: C
Explanation:

Content words are words such as nouns, most verbs, adjectives, and adverbs that refer to some object, action, or characteristic.

Which of these is a process of language change?

  1. Etymology

  2. Grammaticalisation

  3. Compound

  4. Neologism

  5. Orthography


Correct Option: B
Explanation:

In linguistics, grammaticalisation (also known as grammatisation, grammaticisation) is a process of language change by which words representing objects and actions (i.e., nouns and verbs) transform to become grammatical markers (affixes, prepositions, etc).

Which type of coal has the highest calorific content of all types of coal?

  1. Peat

  2. Coking coal

  3. Bituminous coal

  4. Lignite

  5. Anthracite


Correct Option: E
Explanation:

Anthracite has the highest carbon content, the fewest impurities, and the highest calorific content of all types of coal, which also include bituminous coal and lignite. Anthracite is the most metamorphosed type of coal (but still represents low-grade metamorphism), in which the carbon content is between 92.1% and 98%.

Which of the following atmospheric constituents do not contribute to green house effect?

  1. Carbon dioxide

  2. Methane

  3. Argon

  4. Water vapour

  5. Ozone


Correct Option: C
Explanation:

The major atmospheric constituents, nitrogen, oxygen, and argon are not greenhouse gases.

What is the content underneath the spoken dialogue referred to as?

  1. Pitch accent

  2. Dramatic irony

  3. Subtext

  4. Pragmatics

  5. Haptics


Correct Option: C
Explanation:

Subtext or undertone is content of a book, play, musical work, film, video game, or television series, which is not announced explicitly by the characters (or author) but is implicit or becomes something understood by the observer of the work as the production unfolds. Subtext is content underneath the spoken dialogue.

Which of the following is not true about the Legislature in India?

  1. Legislative power in India is exercised by the Parliament.

  2. The Parliament enjoys complete sovereignty.

  3. The Rajya Sabha is considered to be the upper house.

  4. The Lok Sabha is considered to be the lower house.

  5. The members of cabinet may be chosen from parliament.


Correct Option: B
Explanation:

The Parliament does not enjoy complete sovereignty, as its laws are subject to judicial review by the Supreme Court of India.

Which of these refers to an application for retrieving, presenting and traversing information resources on the World Wide Web?

  1. Hyperlink

  2. Web server

  3. URI

  4. Web browser

  5. HTML


Correct Option: D
Explanation:

A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI/URL) and may be a web page, image, video or other piece of content.

Which of the following Universities is not one of the newly established Central Universities under the Central Universities Act, 2009 (Section 25 of 2009)?

  1. Central University of Gujarat

  2. Central University of Bihar

  3. Central University of Kerala

  4. Central University of Tamil Nadu

  5. North Eastern Hill University


Correct Option: E
Explanation:

North Eastern Hill University (NEHU) is a Central University established on 19 July 1973 by an Act of the Indian Parliament. The University is in the suburb of Shillong, the state capital of Meghalaya, India. The University has two campuses: Shillong and Tura in Meghalaya. NEHU Tura Campus functions under a pro-vice chancellor.

In which of the following types of communication are emoticons most widely used?

  1. Presentations

  2. Chat rooms

  3. Face-to-face communication

  4. Telephone

  5. Video conferencing


Correct Option: B
Explanation:

Emotions in virtual communication differ in a variety of ways from those in face-to-face interactions due to the characteristics of computer mediated communication (CMC). Emoticons, or emotional icons, can be used to display various types of emotions. Chat rooms are a type of virtual communication.

Which protocol is used by the web browsers to connect to servers on the World Wide Web?

  1. BGP

  2. ARP

  3. TCP

  4. DNS

  5. SMTP


Correct Option: C
Explanation:

Web browsers use TCP when they connect to servers on the World Wide Web and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP.

Which of these computer memory types has a mechanical moving part?

  1. Flash memory

  2. Hard disk drive

  3. PROM

  4. SRAM

  5. EEPROM


Correct Option: B
Explanation:

A hard disk drive (HDD) is a data storage device used for storing and retrieving digital information using rapidly rotating disks (platters) coated with magnetic material.

Which of the following is a type of malware software?

  1. Firewall

  2. Data mart

  3. Firmware

  4. Computer virus

  5. Boot loader


Correct Option: D
Explanation:

A computer virus is a malware program, which when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be infected.

Which of these viruses infects both boot records and files on the computer system?

  1. Bimodal Virus

  2. Appending Virus

  3. Tunneling Virus

  4. Cluster Virus

  5. Polymorphic Virus


Correct Option: A
Explanation:

It is also called a Boot Sector Infector. A bimodal virus is one that infects both boot records and files on the computer system.

What is the malicious attempt to acquire sensitive information masquerading as a trustworthy entity in an electronic communication referred to as?

  1. Address mungin

  2. Virus hoax

  3. Spam

  4. Email harvesting

  5. Phishing


Correct Option: E
Explanation:

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

Which of these refers to the forging of an e-mail header to make it appear, as if it came from someone other than the actual source?

  1. Chain e-mail

  2. Email encryption

  3. Email authentication

  4. Email Spoofing

  5. Hushmail


Correct Option: D
Explanation:

E-mail spoofing refers to forging an e-mail header to make it appear, as if it came from somewhere or someone other than the actual source. Email spoofing is the creation of email messages with a forged sender address - something, which is simple to do because the core protocols do not authenticate.

Which of these protocols is used by network devices to send error messages?

  1. POP

  2. HTTP

  3. FTP

  4. ICMP

  5. IP


Correct Option: D
Explanation:

The Internet Control Message Protocol (ICMP) is one of the main protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating; that a requested service is not available or that a host or router could not be reached.

Which of the following vitamins is water-soluble?

  1. A

  2. B

  3. D

  4. E

  5. K


Correct Option: B
Explanation:

B vitamins are a group of water-soluble vitamins that play important roles in cell metabolism.

Which of these refers to a computer connected to the Internet that has been compromised by a hacker?

  1. Spyware

  2. Trojan

  3. Zombie

  4. Backdoor

  5. Botnet


Correct Option: C
Explanation:

A zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction.

Which of these is an allergic inflammation of the nasal airways?

  1. Carotenemia

  2. Marasmus

  3. Hay Fever

  4. Allergic conjunctivitis

  5. Bilirubin


Correct Option: C
Explanation:

Allergic rhinitis is an allergic inflammation of the nasal airways. When caused by pollens of any plants, it is called pollinosis, and if specifically caused by grass pollens, it is known as hay fever.

Which of these is a form of malnutrition?

  1. Cholera

  2. Beriberi

  3. Kwashiorkor

  4. Kala-azar

  5. Diphtheria


Correct Option: C
Explanation:

Kwashiorkor is a form of malnutrition that occurs when there is not enough protein in the diet.

- Hide questions