Computer GK Practice Question and Answer
8 Q: What type of personal email account is generally used to download email to my computer?
453 064ba5fc9568e7ff594c24263
64ba5fc9568e7ff594c24263- 1Microsoft Exchangetrue
- 2POP3false
- 3IMAPfalse
- 4HTTPfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Microsoft Exchange"
Explanation :
1. Personal email account Microsoft Exchange is usually used to download e-mail to your computer.
2. Microsoft Exchange Server is Microsoft's email, calendaring, contacts, scheduling, and collaboration platform.
3. It is deployed on the Windows Server operating system (OS) for business use.
4. Microsoft designed Exchange Server to provide users with access to the messaging platform from mobile devices, desktops, and web-based systems.
Q: Examples of social networking sites are?
452 064ba704088d5e4f52de3b568
64ba704088d5e4f52de3b568- 1Facebookfalse
- 2Twitterfalse
- 3Instagramfalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "all of the above"
Explanation :
Examples of social networking sites are.
Google+
Quora
Snapchat
MySpace
Telegram
Flickr
Meetup
Q: Which of the following is not a type of Cyber Threat?
452 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.
Q: Search engines perform the following tasks?
451 064b9139ee154aff53380df03
64b9139ee154aff53380df03- 1Web crawlingfalse
- 2Indexingfalse
- 3Searchingfalse
- 4All of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of the above "
Explanation :
The search engine performs the following tasks-
1. Web crawling: Search engines search all web pages on the web using a crawler. A crawler is a program that finds new web pages by following links on the web.
2. Indexing: Once the crawler finds all the web pages, the search engine indexes them in a database. The index contains information for each web page, such as title, URL, and content.
3. Searching: When a user types a search query, the search engine searches all the web pages in the index that may be related to the query.
Q: U. S. B. The full form of is:
450 064a5413065d2524cbf0bee84
64a5413065d2524cbf0bee84- 1Universal Serial Bustrue
- 2Universal sequential busfalse
- 3Unique serial busfalse
- 4Unique sequential busfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Universal Serial Bus"
Explanation :
1. The full form of USB is Universal Serial Bus.
2. USB is a wired device with the help of which you can connect any other device like mobile with laptop, mobile with computer etc.
3. Apart from this, you can also insert a memory card inside the laptop with its help because it is a port in which we can insert things like Pendrive, Card Reader, Data Cable etc.
Q: Which statement is true for Router and Wretch?
450 063edfee03c221e1b4dd138d6
63edfee03c221e1b4dd138d6- 1Wretch connects two networks at data link layerfalse
- 2Router is more usefulfalse
- 3Router connects two networks at the Network Layer.false
- 4both (a) and (c)true
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "both (a) and (c)"
Q: The expanded form of BCC used in e-mail communication is:
449 06494124413e8bde03235572c
6494124413e8bde03235572c- 1Blue carbon copyfalse
- 2Blind carbon copytrue
- 3Black carbon copyfalse
- 4Back carbon copyfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Blind carbon copy"
Explanation :
1. Blind carbon copy is the extended form of BCC used in e-mail communication.
2. It is used to send a copy of an email to a person without informing the recipient about it i.e. the identity of the recipient mentioned in the 'Bcc field' is hidden from other recipients receiving the same email.
3. Recipients in the BCC list can see every other email address, including the To and CC lists.
Q: Through _______ can you link any location of the current document to another document or website?
446 064b918ce2d3130f5753f2d77
64b918ce2d3130f5753f2d77- 1Linkfalse
- 2Hyperlinktrue
- 3Databasefalse
- 4Formfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Hyperlink"
Explanation :
1. Through hyper link you can connect any location of the current document to another document or website.
2. Hypers are found in almost all web pages. Links allow users to click from one page to another.