Kolkata Police DEO Question Paper 2025 with Answers । কলকাতা পুলিশ Data Entry Operator প্রশ্ন ও উত্তর

0

কলকাতা পুলিশ ডাটা এন্ট্রি অপারেটর পরীক্ষার প্রশ্নপত্র 2025 – বিগত বছরের প্রশ্ন ও সমাধান

Kolkata Police DEO Question Paper 2025 with Answers । কলকাতা পুলিশ Data Entry Operator প্রশ্ন ও উত্তর


কলকাতা পুলিশ Data Entry Operator 2025 প্রশ্ন ও উত্তর খুঁজছেন এমন পরীক্ষার্থীদের জন্য এখানে দেওয়া হয়েছে কলকাতা পুলিশ ডাটা এন্ট্রি অপারেটর পরীক্ষার প্রশ্নপত্র, Kolkata Police DEO Question Paper 2025 Answer Key, এবং কলকাতা পুলিশ DEO প্রশ্নপত্র 2025 PDF একসাথে। এই আর্টিকেলে আপনি পাবেন Kolkata Police DEO Exam Question Paper 2025, পাশাপাশি কলকাতা পুলিশ ডাটা এন্ট্রি অপারেটর বিগত বছরের প্রশ্ন যা পরীক্ষার প্রস্তুতিতে বিশেষ সহায়ক। এছাড়াও পরীক্ষার্থীদের সুবিধার জন্য যুক্ত করা হয়েছে Kolkata Police Constable Answer Key 2025, পশ্চিমবঙ্গ পুলিশ পরীক্ষার প্রশ্নপত্র, এবং Kolkata Police Constable 2025 Question Paper and Answer Key সম্পর্কিত গুরুত্বপূর্ণ তথ্য। যারা Kolkata Police Data Entry Operator Answer Key এবং Kolkata Police Data Entry Operator Exam Date 2025 জানতে চান, তাদের জন্যও এই পোস্টটি অত্যন্ত গুরুত্বপূর্ণ। পাশাপাশি এখানে আপনি সহজে ডাউনলোড করতে পারবেন WBP Question Paper 2025 in Bengali PDF, যা ভবিষ্যৎ পরীক্ষার প্রস্তুতিকে আরও শক্তিশালী করবে।


Data Entry Operator written Test Questions and Answers

যেকোনো রকম ছোট-বড়ো Data Entry Operator Exam এর জন্য সঠিক প্রস্তুতি নেওয়া অত্যন্ত গুরুত্বপূর্ণ। তাই পরীক্ষার্থীদের জন্য এখানে একসাথে দেওয়া হয়েছে Data entry operator exam syllabus, গুরুত্বপূর্ণ Data entry operator exam questions, এবং পরীক্ষায় বারবার আসা Data Entry Operator written Test Questions and Answers। পাশাপাশি পরীক্ষার আপডেট জানতে Data Entry Operator exam Date, অনুশীলনের জন্য Data Entry Operator Mock Test, এবং বাস্তব পরীক্ষার অভিজ্ঞতা পেতে Domestic Data Entry Operator Exam Paper অত্যন্ত সহায়ক। এছাড়া দ্রুত প্রস্তুতির জন্য সংগ্রহ করতে পারেন Data Entry Operator MCQ Questions and Answers PDF ও পূর্ববর্তী Data Entry Exam paper, যা আপনাকে পরীক্ষার ধরন বুঝতে এবং সফলভাবে Data Entry Operator চাকরির পরীক্ষায় উত্তীর্ণ হতে সাহায্য করবে।


Kolkata Police Data Entry Operator Exam 2025 Question Paper, Answer Key ও WBP Question Paper PDF



1. Which type of data entry method requires the operator to extract and input information from a scanned image of a document into a digital record?


(A) Manual data entry

(B) Voice-activated data entry

(C) Optical Character Recognition (OCR) data entry

(D) Direct data input


2. You cannot close MS Word application by


(A) pressing Alt+F4

(B) choosing File menu then Exit submenu

(C) clicking X button on title bar

(D) Choosing Close submenu from File menu


3. What does "Run as Administrator" do?


(A) Grants higher privileges to the program.

(B) Speeds up the program.

(C) Runs the program in background.

(D) Opens the program with limited access.


4. What is the main advantage of blockchain?


(A) Centralized control

(B) Transparency and security

(C) Fast internet speed

(D) Large storage capacity


5. You need to create a formula that will return a specific value if a condition is met, and a different value if it is not. It also needs to handle an optional third value if another condition is met. Which of the following formulae would correctly achieve this?


(A) IF(Condition1, Value_If_True, IF(Condition2, Value_If_Another_True, Value_If_False))

(B) OR(Condition1, Condition2, Value_If_True, Value_If_False)

(C) IF(AND(Condition1, Condition2), Value_If_True, Value_If_False)

(D) LOOKUP(Value If True, Condition1, Condition2, Value If False)


6. Bandwidth is measured in which of the following units?


(A) Bytes

(B) Bits per second

(C) Gigahertz

(D) Pixels


7. What is the purpose of Windows Defender?


(A) To protect hard disk from crashing

(B) To format hard drives

(C) To protect against malware and viruses

(D) To improve system performance


8. What is the default port for HTTP?


(A) 21

(B) 22

(C) 80

(D) 443


9. What is the purpose of a DHCP server in a wireless network?


(A) To provide encryption keys

(B) To assign IP addresses dynamically to devices

(C) To amplify the Wi-Fi signal

(D) To filter and block unwanted network traffic


10. Which one is a Linux desktop environment?


(A) GNOME

(B) CMD

(C) PowerShell

(D) BIOS


11. Which of the following is used to create a relationship between tables in Access?


(A) Primary Key

(B) Foreign Key

(C) Composite Key

(D) All of the above


12. Which of the following allows you to connect and login to a remote computer?


(A) SMTP

(B) HTTP

(C) FTP

(D) Telnet


13. What is a key responsibility of data entry operators in terms of confidentiality and data security?


(A) Troubleshooting errors

(B) Communicating effectively with team members

(C) Organizing and managing files

(D) Following privacy policies, access restrictions, and confidentiality agreements


14. The shortcut to start a slide show from the beginning is


(A) F2

(B) F5

(C) F7

(D) F12


15. In a scenario requiring data entry from various sources (e.g., forms, handwritten documents), which technique would you employ to maintain consistency and prevent errors?


(A) Using random data validation checks

(B) Establishing clear data entry standards and using lookup tables

(C) Relying on the system to automatically correct data

(D) Prioritizing speed over strict adherence to standards


16. WhatsApp end-to-end encryption is


(A) AES

(B) RSA

(C) Signal Protocol

(D) DES


17. Which command is used to delete all the files with extension .txt on the current drive and directory?


(A) Erase .txt

(B) Del.txt

(C) Del./p

(D) Del *.txt


18. To view the network settings of your computer, what is the command to use?


(A) netview

(B) ipconfig

(C) ncpa.cpl

(D) netstat


25. In Microsoft Excel, which function is used to calculate the sum of a range of cells?


(A) =SUM()

(B) =ADD()

(C) =TOTAL()

(D) =SUMTOTAL()


26. BCC in email means


(A) Blind Carbon Copy

(B) Backup Communication Channel

(C) Base Central Copy

(D) Broadcast Channel Copy


27. In contrast to IPv4, IPv6 uses ______ times more bits to address a device on the Internet.


(A) 2

(B) 8

(C) 4

(D) 6


28. DNS is used for


(A) encrypting data

(B) translating domain names into IP addresses

(C) sending emails

(D) hosting websites


29. Cache memory is located


(A) inside CPU

(B) on Hard Disk

(C) in RAM

(D) on Motherboard only


30. The feature that fills up forms etc. automatically with preset values is


(A) Filter

(B) Auto Fill

(C) Fill up

(D) None of the above 


31. What does SSD stand for?


(A) Solid State Drive

(B) Super Storage Device

(C) Secure System Disk

(D) Standard State Drive


32. What tool is commonly used to access the Dark Web?


(A) Google Chrome

(B) Mozilla Firefox

(C) Tor Browser

(D) Safari


33. Which switch should be used in the DIR command to view files in all directories?


(A) /s

(B) A

(C) /p

(D) /w


34. Which port is not used to connect a monitor?


(A) HDMI

(B) VGA

(C) DVI

(D) PS/2


35. Which of the following is a type of cyber-attack?


(A) Phishing

(B) SQL Injections

(C) Password Attack

(D) All of the above


36. Which of the following is NOT a part of MS Office Suite?


(A) MS Word

(B) MS Excel

(C) MS Paint

(D) MS PowerPoint


37. Which function finds the largest value in a range?


(A) MAX()

(B) MIN()

(C) SUM()

(D) COUNT()


38. What is Ransomware?


(A) A hardware failure

(B) A malicious software that encrypts files for ransom

(C) A password manager

(D) A type of antivirus


39. Which of the following best describes a zero-day vulnerability?


(A) A vulnerability that has been publicly known for a long time

(B) A vulnerability that has been patched by the vendor, but the patch is not yet applied

(C) A vulnerability in software that is unknown to the public and the vendor

(D) A vulnerability that only affects outdated operating systems


40. The "Presenter View" in PowerPoint allows


(A) audience to control slides

(B) to show speaker notes on presenter's screen only

(C) to duplicate screen always

(D) to print


41. Volatile data resides in


(A) registries

(B) cache

(C) RAM

(D) All of the above


42. What does CSV stand for?


(A) Comma-Separated Values

(B) Computer System Validation

(C) Common Source Versioning

(D) Code Structured Variables


43. Some viruses have delayed payload, which is sometimes called a


(A) Bomb

(B) Worm

(C) SQL Injection

(D) All of the above


44. The speed of a computer is measured in


(A) Bytes per second

(B) Hertz (Hz)

(C) Gigabytes

(D) Megapixels


45. What is the purpose of password expiration in a policy?


(A) To prevent users from forgetting their passwords

(B) To ensure compliance with privacy laws

(C) To limit the time window for potential compromise

(D) To make passwords easier to remember


46. Which of the following web browsers is not from Microsoft?


(A) Edge

(B) Internet Explorer

(C) Internet Explorer 6.0

(D) Safari


47. In a data entry context, what does "data scrubbing" refer to?


(A) The process of physically cleaning the keyboard

(B) Removing errors and inconsistencies from a dataset

(C) The digital removal of outdated files

(D) Encrypting sensitive data for security


48. In MS Word, Ctrl + L is used for


(A) Left Align

(B) Lock Document

(C) Line Spacing

(D) Insert Link


49. What is steganography?


(A) A type of malware

(B) A method of concealing information within digital files

(C) A hacking technique

(D) A forensic imaging tool


50. Which feature is used to create smooth movement between slides?


(A) Animations

(B) Transitions

(C) Slide Show

(D) Motion Graphics


51. If you receive a 'No bootable device' error message on startup, what should you check?


(A) Monitor connection

(B) Hard drive status

(C) RAM modules

(D) Keyboard functionality


52. Which of the following tools is used in Wi-Fi hacking?


(A) Wireshark

(B) Aircrack-ng

(C) Norton

(D) None of the above


53. SFF in terms of computer cabinet means


(A) Super Fast Factor

(B) Small Form Factor

(C) Small Fast Factor

(D) Swift Fast Fine


54. What is the primary function of optical character recognition (OCR) software?


(A) Creating and editing text documents

(B) Managing numerical data and calculations

(C) Designing visual presentations

(D) Converting printed or handwritten text into digital text


55. What is the correct way to open a file in read mode?


(A) open('file.txt', 'r')

(B) open('file.txt', 'w')

(C) open('file.txt', 'rb')

(D) open('file.txt', 'rw')


56. What does a VPN do?


(A) Encrypts internet traffic and hides user identity

(B) Increases download speed

(C) Scans devices for malware

(D) Prevents phishing emails


57. What is the binary representation of the decimal number 10?


(A) 1100

(B) 1001

(C) 1111

(D) 1010


58. In MS Excel the formula =IF(5>3,"Yes","No")


(A) 5

(B) 3

(C) Yes

(D) No


59. What is a primary risk of using a single, weak password for all online services, and how does it relate to email security?


(A) It increases the likelihood of a DDoS attack

(B) It limits the victim's bandwidth, reducing internet speed

(C) A compromised email account can lead to the compromise of other linked online accounts

(D) It makes the user's computer more vulnerable to viruses and malware


60. What is the Dark Web primarily used for?


(A) Online shopping

(B) Accessing encrypted data

(C) Anonymous browsing

(D) Internet gaming 


61. What does 'BSOD' stand for in the context of computer errors?


(A) Blue Screen Of Death

(B) Broken Software On Drive

(C) Bad Sector Of Drive

(D) Bad System Of Disk


62. Which view is best for editing a document?


(A) Print Layout

(B) Outline

(C) Draft

(D) Web Layout


63. The attachment size limit in Gmail is


(A) 10 MB

(B) 15 MB

(C) 20 MB

(D) 25 MB


64. When you want to insert a page break, what is the quickest shortcut key to achieve this in a Word document?


(A) Ctrl+W

(B) Ctrl+Shift+Enter


65. Which of the following is used for encrypting data at the network level?


(A) HTTP

(B) SMTP

(C) S/MIME

(D) IPSEC


66. Which of these is not a web browser?


(A) Firefox

(B) Chrome

(C) Safari

(D) WhatsApp


67. Which of the following is the most advanced method for adding precise, custom layout elements such as grids, lines, and specific shapes with precise dimensions in Word?


(A) Using the basic Table tools

(B) Inserting Shapes and Smart Arts

(C) Creating a text box and using extreme formatting options

(D) Using Word's VBA (Visual Basic for Applications) to program custom elements


68. In Windows, the shortcut key Alt + Tab is used for


(A) closing all windows

(B) switching between open applications

(C) minimizing all windows

(D) opening Task Manager


69. What is the correct sequence of steps to sort data in Microsoft Excel?


(A) Select data range, click on the Sort button, choose sorting options

(B) Select data range, choose sorting options, click on the Sort button

(C) Choose sorting options, select data range, click on the Sort button

(D) Click on the Sort button, select data range, choose sorting options


70. A PowerPoint design template is stored in any file with the extensions


(A) pps

(B) pptx

(C) potx

(D) pdt


Kolkata Police Data Entry Operator 2025 Answer Key 


1 C 2 C 3 A 4 B 5 A

6 B 7 C 8 C 9 B 10 A

11 D 12 D 13 D 14 B 15 B

16 C 17 D 18 B 19 B 20 B

21 D 22 C 23 C 24 C 25 A

26 A 27 C 28 B 29 A 30 B

31 A 32 C 33 A 34 D 35 D

36 C 37 A 38 B 39 C 40 B

41 D 42 A 43 A 44 B 45 C

46 D 47 B 48 A 49 B 50 B

51 B 52 B 53 B 54 D 55 A

56 A 57 D 58 C 59 C 60 C

61 A 62 C 63 D 64 B 65 D

66 D 67 D 68 B 69 B 70 C





একটি মন্তব্য পোস্ট করুন

0মন্তব্যসমূহ

Enter Your Comment

একটি মন্তব্য পোস্ট করুন (0)