28 Aug 2024- Evening Shift- UGC NET Paper 1

Total Questions: 50

31. A keylogger, short for Keystroke logger, is type of cyber threat. Keyloggers are a form of____.

Correct Answer: (4) Spyware

32. Which of the following pair of acronyms and their expansion is incorrectly matched?

Correct Answer: (4) USB – Universal Secure Bus

33. Which of the following software titles are examples of system software?

A. Ubuntu
B. Google Docs
C. MS-Office 365
D. Android
E. Chrome OS

 

Choose the correct answer from the options given below:

Correct Answer: (3) A, D and E only

34. Match the List-I with List-II

LIST I (Unit of Data Capacity)LIST II (Approximate Size)
A. KilobyteI. 8 billion bits
B. GigabyteII. 8 million bits
C. TerabyteIII. 8 thousands bits
D. MegabyteIV. 8 trillion bits

Choose the correct answer from the options given below:

Correct Answer: (1) A-III, B-I, C-IV, D-II

35. Match the List-I with List-II

LIST I (Fuel Type)LIST II (Example)
A. Non fuelI. Biodiesel
B. Alternative fuelII. Hydrogen fuel cell
C. Non traditional fossil fuelIII. Wind power
D. Emerging fuel IV. Compressed Natural Gas (CNG)

Choose the correct answer from the options given below:

Correct Answer: (4) A-III, B-I, C-IV, D-II

36. Which of the following is not caused due to noise pollution?

Correct Answer: (1) Bronchitis

37. ‘Which of the following are true about Waste-to-Energy incinerations?

A. It serves dual purpose of disposing municipal solid waste and producing energy
B. It produces fly ash
C. It produces bottom ash
D. It generates a high level toxic air pollutant-dioxin
E. It produces toxic metals such as Lead and Mercury

 

Choose the correct answer from the options given below:

Correct Answer: (4) A, B, C, D and E only

38. Which of the following cause indirect Green House Warming?

A. CH₄
B. NO
C. NO₂
D. N₂O
E. CO

 

Choose the correct answer from the options given below:

Correct Answer: (4) B, C and E only

39. In cyber world, Black Hat Hackers are individuals with extra-ordinary computing skills who use these skills with malicious intent. In this context, identify the correct order for a successful black hat operation.

A. Scanning
B. Reconnaissance
C. Gaining Access
D. Covering Tracks
E. Maintaining Access

 

Choose the correct answer from the options given below:

Correct Answer: (2) B, A, C, E, D

40. So far, which of the following countries has not ratified the Convention on Biological Diversity?

Correct Answer: (4) United States of America