UGC NET Questions (Paper – 1)

Reset

Q: Select the wrong statement(s) about big data and learning analytics in higher education:

(A) Learning analytics involves collecting and analysing data about learners to improve teaching and learning;
(B) Big data in education can include clickstream data from LMS, assessment scores and engagement indicators;
(C) Use of learning analytics never raises concerns about privacy or ethical handling of student data;
(D) Dashboards based on analytics can provide feedback to teachers and students about progress;
Choose the correct answer from the options given below:

Q: Which of the following statements about the flipped classroom approach supported by ICT are correct?

(A) In a flipped classroom, students typically watch lecture videos or study materials before class time;
(B) Classroom time can be used for discussion, problem-solving and application activities;
(C) Flipped classroom pedagogy assumes that students should never engage in collaborative work during class;
(D) ICT tools such as video platforms and LMS support the distribution of pre-class materials and collection of responses;
Choose the correct answer from the options given below:

Q: Which of the following statements about Management Information Systems (MIS) in educational institutions are correct?

(A) MIS can integrate data from admissions, examinations and finance to support decision-making;
(B) Dashboards in an MIS can present key performance indicators to administrators;
(C) MIS is used only for storing printed records in filing cabinets without any digital processing;
(D) Well-designed MIS can support planning, monitoring and evaluation of institutional activities;
Choose the correct answer from the options given below:

Q: Which of the following statements about virtual labs and simulations in ICT-based education are correct?

(A) Virtual labs can simulate experiments that may be expensive or hazardous in physical settings;
(B) Simulations can provide opportunities for repeated practice and exploration with adjustable parameters;
(C) Teachers need to align virtual lab activities with learning objectives and assessment tasks;
(D) Using virtual labs means students no longer need any hands-on experience with real equipment in all disciplines;
(E) Access to virtual labs may allow learners in remote locations to experience experiments that are otherwise unavailable;
(F) Technical support and infrastructure requirements are irrelevant when adopting virtual labs;
Choose the correct answer from the options given below:

Q: Which of the following statements about designing effective online video lectures are correct?

(A) Breaking long lectures into shorter segments can help maintain learner attention;
(B) Embedding in-video quizzes can promote active engagement with the content;
(C) Providing transcripts and downloadable slides supports diverse learning preferences and needs;
(D) Recording with consistently poor audio quality is acceptable because learners can always infer the content;
(E) Clear learning outcomes should be communicated at the beginning of video lectures;
(F) Video lectures should never include visual aids such as diagrams, demos or screen-sharing;
Choose the correct answer from the options given below:

Q: Which of the following statements about the environmental impact of ICT are correct?

(A) Large data centres consume significant energy and may contribute to greenhouse gas emissions;
(B) E-waste from discarded electronic devices can release hazardous substances if improperly handled;
(C) Extending the lifespan of devices through repair and reuse can help reduce e-waste;
(D) Environmental considerations are irrelevant when planning institutional ICT infrastructure;
(E) Power management settings on computers can reduce energy consumption during idle periods;
(F) Responsible procurement can include criteria such as energy efficiency and recyclability of ICT equipment;
Choose the correct answer from the options given below:

Q: Select the wrong statement(s) about cybercrimes and misuse of ICT:

(A) Hacking refers to unauthorised access to computer systems or networks;
(B) Identity theft involves misusing another person’s personal data for fraudulent purposes;
(C) Phishing is a technique used to trick users into revealing sensitive information such as passwords or bank details;
(D) Cybercrimes are possible only when computers are physically stolen and cannot occur over networks;
Choose the correct answer from the options given below:

Scroll to Top