UGC NET Paper1 Previous Year Solved Papers - 20th June 2019 Evening Shift

Avatto > > UGC NET PAPER 1 > > UGC NET Paper1 Previous Year Solved Papers > > 20th June 2019 Evening Shift

41. Which of the following is an example of proprietary system software?

  • Option : D
  • Explanation : Proprietary software, also known as closed- source software, is a non-free computer software for which the software's publisher or another person retains intellectual property rights--usually copyright of the source code, but sometimes patent rights. Examples of proprietary software include Microsoft Windows, Adobe Flash Player, PS3 OS, iTunes, Adobe Photoshop, Google Earth, mac OS (formerly Mac OS X and OS X), Skype, WinRAR, Oracle's version of Java and some versions of Unix.
Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


42. Which one of the following universities is not among the first three that were established during 1857?

  • Option : C
  • Explanation : The Universities of Calcutta, Bombay and Madras were established in 1857 through the University Act, 1857 officially called the University Act No II of 1857 that was passed by the indian Legislative Council. While Delhi University was founded in 1992 by an Act of Central Legislative Assembly.
Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


43. “Gyanvani” launched by IGNOU to cover the educational needs of India refers to:

  • Option : B
  • Explanation : IGNOU's radio channel Gyan Vani (GV)was conceived in 2001 as a network of educational FM Radio Channels operating from various cities in the country. With an aim to enhance and supplement the teaching-learning process, each GV Station has a range of about 60 kms and covers an entire city/town including the adjoining rural areas.
Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


44. With respect to computers, which one of the following best describes phishing?

  • Option : D
  • Explanation : Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *


45. Which one of the following coordinates, promotes and funds research activities of all social sciences disciplines?

  • Option : C
  • Explanation : Indian Council of Social Science Research (ICSSR) was established in the year of 1969 by the Government of India to promote research in social sciences in the country. It provides grants for projects, fellowships, international collaboration, capacity building, survey, publications etc. to promote research in social sciences in India.
Cancel reply

Your email address will not be published. Required fields are marked *


Cancel reply

Your email address will not be published. Required fields are marked *