কলকাতা পুলিশ ডাটা এন্ট্রি অপারেটর পরীক্ষার প্রশ্নপত্র 2025 – বিগত বছরের প্রশ্ন ও সমাধান
Data Entry Operator written Test Questions and Answers
যেকোনো রকম ছোট-বড়ো Data Entry Operator Exam এর জন্য সঠিক প্রস্তুতি নেওয়া অত্যন্ত গুরুত্বপূর্ণ। তাই পরীক্ষার্থীদের জন্য এখানে একসাথে দেওয়া হয়েছে Data entry operator exam syllabus, গুরুত্বপূর্ণ Data entry operator exam questions, এবং পরীক্ষায় বারবার আসা Data Entry Operator written Test Questions and Answers। পাশাপাশি পরীক্ষার আপডেট জানতে Data Entry Operator exam Date, অনুশীলনের জন্য Data Entry Operator Mock Test, এবং বাস্তব পরীক্ষার অভিজ্ঞতা পেতে Domestic Data Entry Operator Exam Paper অত্যন্ত সহায়ক। এছাড়া দ্রুত প্রস্তুতির জন্য সংগ্রহ করতে পারেন Data Entry Operator MCQ Questions and Answers PDF ও পূর্ববর্তী Data Entry Exam paper, যা আপনাকে পরীক্ষার ধরন বুঝতে এবং সফলভাবে Data Entry Operator চাকরির পরীক্ষায় উত্তীর্ণ হতে সাহায্য করবে।
Kolkata Police Data Entry Operator Exam 2025 Question Paper, Answer Key ও WBP Question Paper PDF
1. Which type of data entry method requires the operator to extract and input information from a scanned image of a document into a digital record?
(A) Manual data entry
(B) Voice-activated data entry
(C) Optical Character Recognition (OCR) data entry
(D) Direct data input
2. You cannot close MS Word application by
(A) pressing Alt+F4
(B) choosing File menu then Exit submenu
(C) clicking X button on title bar
(D) Choosing Close submenu from File menu
3. What does "Run as Administrator" do?
(A) Grants higher privileges to the program.
(B) Speeds up the program.
(C) Runs the program in background.
(D) Opens the program with limited access.
4. What is the main advantage of blockchain?
(A) Centralized control
(B) Transparency and security
(C) Fast internet speed
(D) Large storage capacity
5. You need to create a formula that will return a specific value if a condition is met, and a different value if it is not. It also needs to handle an optional third value if another condition is met. Which of the following formulae would correctly achieve this?
(A) IF(Condition1, Value_If_True, IF(Condition2, Value_If_Another_True, Value_If_False))
(B) OR(Condition1, Condition2, Value_If_True, Value_If_False)
(C) IF(AND(Condition1, Condition2), Value_If_True, Value_If_False)
(D) LOOKUP(Value If True, Condition1, Condition2, Value If False)
6. Bandwidth is measured in which of the following units?
(A) Bytes
(B) Bits per second
(C) Gigahertz
(D) Pixels
7. What is the purpose of Windows Defender?
(A) To protect hard disk from crashing
(B) To format hard drives
(C) To protect against malware and viruses
(D) To improve system performance
8. What is the default port for HTTP?
(A) 21
(B) 22
(C) 80
(D) 443
9. What is the purpose of a DHCP server in a wireless network?
(A) To provide encryption keys
(B) To assign IP addresses dynamically to devices
(C) To amplify the Wi-Fi signal
(D) To filter and block unwanted network traffic
10. Which one is a Linux desktop environment?
(A) GNOME
(B) CMD
(C) PowerShell
(D) BIOS
11. Which of the following is used to create a relationship between tables in Access?
(A) Primary Key
(B) Foreign Key
(C) Composite Key
(D) All of the above
12. Which of the following allows you to connect and login to a remote computer?
(A) SMTP
(B) HTTP
(C) FTP
(D) Telnet
13. What is a key responsibility of data entry operators in terms of confidentiality and data security?
(A) Troubleshooting errors
(B) Communicating effectively with team members
(C) Organizing and managing files
(D) Following privacy policies, access restrictions, and confidentiality agreements
14. The shortcut to start a slide show from the beginning is
(A) F2
(B) F5
(C) F7
(D) F12
15. In a scenario requiring data entry from various sources (e.g., forms, handwritten documents), which technique would you employ to maintain consistency and prevent errors?
(A) Using random data validation checks
(B) Establishing clear data entry standards and using lookup tables
(C) Relying on the system to automatically correct data
(D) Prioritizing speed over strict adherence to standards
16. WhatsApp end-to-end encryption is
(A) AES
(B) RSA
(C) Signal Protocol
(D) DES
17. Which command is used to delete all the files with extension .txt on the current drive and directory?
(A) Erase .txt
(B) Del.txt
(C) Del./p
(D) Del *.txt
18. To view the network settings of your computer, what is the command to use?
(A) netview
(B) ipconfig
(C) ncpa.cpl
(D) netstat
25. In Microsoft Excel, which function is used to calculate the sum of a range of cells?
(A) =SUM()
(B) =ADD()
(C) =TOTAL()
(D) =SUMTOTAL()
26. BCC in email means
(A) Blind Carbon Copy
(B) Backup Communication Channel
(C) Base Central Copy
(D) Broadcast Channel Copy
27. In contrast to IPv4, IPv6 uses ______ times more bits to address a device on the Internet.
(A) 2
(B) 8
(C) 4
(D) 6
28. DNS is used for
(A) encrypting data
(B) translating domain names into IP addresses
(C) sending emails
(D) hosting websites
29. Cache memory is located
(A) inside CPU
(B) on Hard Disk
(C) in RAM
(D) on Motherboard only
30. The feature that fills up forms etc. automatically with preset values is
(A) Filter
(B) Auto Fill
(C) Fill up
(D) None of the above
31. What does SSD stand for?
(A) Solid State Drive
(B) Super Storage Device
(C) Secure System Disk
(D) Standard State Drive
32. What tool is commonly used to access the Dark Web?
(A) Google Chrome
(B) Mozilla Firefox
(C) Tor Browser
(D) Safari
33. Which switch should be used in the DIR command to view files in all directories?
(A) /s
(B) A
(C) /p
(D) /w
34. Which port is not used to connect a monitor?
(A) HDMI
(B) VGA
(C) DVI
(D) PS/2
35. Which of the following is a type of cyber-attack?
(A) Phishing
(B) SQL Injections
(C) Password Attack
(D) All of the above
36. Which of the following is NOT a part of MS Office Suite?
(A) MS Word
(B) MS Excel
(C) MS Paint
(D) MS PowerPoint
37. Which function finds the largest value in a range?
(A) MAX()
(B) MIN()
(C) SUM()
(D) COUNT()
38. What is Ransomware?
(A) A hardware failure
(B) A malicious software that encrypts files for ransom
(C) A password manager
(D) A type of antivirus
39. Which of the following best describes a zero-day vulnerability?
(A) A vulnerability that has been publicly known for a long time
(B) A vulnerability that has been patched by the vendor, but the patch is not yet applied
(C) A vulnerability in software that is unknown to the public and the vendor
(D) A vulnerability that only affects outdated operating systems
40. The "Presenter View" in PowerPoint allows
(A) audience to control slides
(B) to show speaker notes on presenter's screen only
(C) to duplicate screen always
(D) to print
41. Volatile data resides in
(A) registries
(B) cache
(C) RAM
(D) All of the above
42. What does CSV stand for?
(A) Comma-Separated Values
(B) Computer System Validation
(C) Common Source Versioning
(D) Code Structured Variables
43. Some viruses have delayed payload, which is sometimes called a
(A) Bomb
(B) Worm
(C) SQL Injection
(D) All of the above
44. The speed of a computer is measured in
(A) Bytes per second
(B) Hertz (Hz)
(C) Gigabytes
(D) Megapixels
45. What is the purpose of password expiration in a policy?
(A) To prevent users from forgetting their passwords
(B) To ensure compliance with privacy laws
(C) To limit the time window for potential compromise
(D) To make passwords easier to remember
46. Which of the following web browsers is not from Microsoft?
(A) Edge
(B) Internet Explorer
(C) Internet Explorer 6.0
(D) Safari
47. In a data entry context, what does "data scrubbing" refer to?
(A) The process of physically cleaning the keyboard
(B) Removing errors and inconsistencies from a dataset
(C) The digital removal of outdated files
(D) Encrypting sensitive data for security
48. In MS Word, Ctrl + L is used for
(A) Left Align
(B) Lock Document
(C) Line Spacing
(D) Insert Link
49. What is steganography?
(A) A type of malware
(B) A method of concealing information within digital files
(C) A hacking technique
(D) A forensic imaging tool
50. Which feature is used to create smooth movement between slides?
(A) Animations
(B) Transitions
(C) Slide Show
(D) Motion Graphics
51. If you receive a 'No bootable device' error message on startup, what should you check?
(A) Monitor connection
(B) Hard drive status
(C) RAM modules
(D) Keyboard functionality
52. Which of the following tools is used in Wi-Fi hacking?
(A) Wireshark
(B) Aircrack-ng
(C) Norton
(D) None of the above
53. SFF in terms of computer cabinet means
(A) Super Fast Factor
(B) Small Form Factor
(C) Small Fast Factor
(D) Swift Fast Fine
54. What is the primary function of optical character recognition (OCR) software?
(A) Creating and editing text documents
(B) Managing numerical data and calculations
(C) Designing visual presentations
(D) Converting printed or handwritten text into digital text
55. What is the correct way to open a file in read mode?
(A) open('file.txt', 'r')
(B) open('file.txt', 'w')
(C) open('file.txt', 'rb')
(D) open('file.txt', 'rw')
56. What does a VPN do?
(A) Encrypts internet traffic and hides user identity
(B) Increases download speed
(C) Scans devices for malware
(D) Prevents phishing emails
57. What is the binary representation of the decimal number 10?
(A) 1100
(B) 1001
(C) 1111
(D) 1010
58. In MS Excel the formula =IF(5>3,"Yes","No")
(A) 5
(B) 3
(C) Yes
(D) No
59. What is a primary risk of using a single, weak password for all online services, and how does it relate to email security?
(A) It increases the likelihood of a DDoS attack
(B) It limits the victim's bandwidth, reducing internet speed
(C) A compromised email account can lead to the compromise of other linked online accounts
(D) It makes the user's computer more vulnerable to viruses and malware
60. What is the Dark Web primarily used for?
(A) Online shopping
(B) Accessing encrypted data
(C) Anonymous browsing
(D) Internet gaming
61. What does 'BSOD' stand for in the context of computer errors?
(A) Blue Screen Of Death
(B) Broken Software On Drive
(C) Bad Sector Of Drive
(D) Bad System Of Disk
62. Which view is best for editing a document?
(A) Print Layout
(B) Outline
(C) Draft
(D) Web Layout
63. The attachment size limit in Gmail is
(A) 10 MB
(B) 15 MB
(C) 20 MB
(D) 25 MB
64. When you want to insert a page break, what is the quickest shortcut key to achieve this in a Word document?
(A) Ctrl+W
(B) Ctrl+Shift+Enter
65. Which of the following is used for encrypting data at the network level?
(A) HTTP
(B) SMTP
(C) S/MIME
(D) IPSEC
66. Which of these is not a web browser?
(A) Firefox
(B) Chrome
(C) Safari
(D) WhatsApp
67. Which of the following is the most advanced method for adding precise, custom layout elements such as grids, lines, and specific shapes with precise dimensions in Word?
(A) Using the basic Table tools
(B) Inserting Shapes and Smart Arts
(C) Creating a text box and using extreme formatting options
(D) Using Word's VBA (Visual Basic for Applications) to program custom elements
68. In Windows, the shortcut key Alt + Tab is used for
(A) closing all windows
(B) switching between open applications
(C) minimizing all windows
(D) opening Task Manager
69. What is the correct sequence of steps to sort data in Microsoft Excel?
(A) Select data range, click on the Sort button, choose sorting options
(B) Select data range, choose sorting options, click on the Sort button
(C) Choose sorting options, select data range, click on the Sort button
(D) Click on the Sort button, select data range, choose sorting options
70. A PowerPoint design template is stored in any file with the extensions
(A) pps
(B) pptx
(C) potx
(D) pdt
Kolkata Police Data Entry Operator 2025 Answer Key
1 C 2 C 3 A 4 B 5 A
6 B 7 C 8 C 9 B 10 A
11 D 12 D 13 D 14 B 15 B
16 C 17 D 18 B 19 B 20 B
21 D 22 C 23 C 24 C 25 A
26 A 27 C 28 B 29 A 30 B
31 A 32 C 33 A 34 D 35 D
36 C 37 A 38 B 39 C 40 B
41 D 42 A 43 A 44 B 45 C
46 D 47 B 48 A 49 B 50 B
51 B 52 B 53 B 54 D 55 A
56 A 57 D 58 C 59 C 60 C
61 A 62 C 63 D 64 B 65 D
66 D 67 D 68 B 69 B 70 C


Enter Your Comment