Computer GK Practice Question and Answer

Q:

What type of personal email account is generally used to download email to my computer?

453 0

  • 1
    Microsoft Exchange
    Correct
    Wrong
  • 2
    POP3
    Correct
    Wrong
  • 3
    IMAP
    Correct
    Wrong
  • 4
    HTTP
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Microsoft Exchange"
Explanation :

1. Personal email account Microsoft Exchange is usually used to download e-mail to your computer.

2. Microsoft Exchange Server is Microsoft's email, calendaring, contacts, scheduling, and collaboration platform.

3. It is deployed on the Windows Server operating system (OS) for business use.

4. Microsoft designed Exchange Server to provide users with access to the messaging platform from mobile devices, desktops, and web-based systems.

Q:

Examples of social networking sites are?

452 0

  • 1
    Facebook
    Correct
    Wrong
  • 2
    Twitter
    Correct
    Wrong
  • 3
    Instagram
    Correct
    Wrong
  • 4
    all of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "all of the above"
Explanation :

Examples of social networking sites are.

Facebook

Twitter

Instagram

Google+

WhatsApp

Quora

LinkedIn

Pinterest

Snapchat

MySpace

Telegram

WeChat

Flickr

Meetup

Q:

Which of the following is not a type of Cyber Threat?

452 0

  • 1
    Hunting
    Correct
    Wrong
  • 2
    Fishing
    Correct
    Wrong
  • 3
    Spy
    Correct
    Wrong
  • 4
    Hacking
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Hunting"
Explanation :

There are many types of cyber threats, including:

1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.

2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.

3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.

4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.

5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.

6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.

7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.

8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.

9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

Q:

Search engines perform the following tasks?

451 0

  • 1
    Web crawling
    Correct
    Wrong
  • 2
    Indexing
    Correct
    Wrong
  • 3
    Searching
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "All of the above "
Explanation :

The search engine performs the following tasks-

1. Web crawling: Search engines search all web pages on the web using a crawler. A crawler is a program that finds new web pages by following links on the web.

2. Indexing: Once the crawler finds all the web pages, the search engine indexes them in a database. The index contains information for each web page, such as title, URL, and content.

3. Searching: When a user types a search query, the search engine searches all the web pages in the index that may be related to the query.

Q:

U. S. B. The full form of is:

450 0

  • 1
    Universal Serial Bus
    Correct
    Wrong
  • 2
    Universal sequential bus
    Correct
    Wrong
  • 3
    Unique serial bus
    Correct
    Wrong
  • 4
    Unique sequential bus
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Universal Serial Bus"
Explanation :

1. The full form of USB is Universal Serial Bus.

2. USB is a wired device with the help of which you can connect any other device like mobile with laptop, mobile with computer etc.

3. Apart from this, you can also insert a memory card inside the laptop with its help because it is a port in which we can insert things like Pendrive, Card Reader, Data Cable etc.

Q:

Which statement is true for Router and Wretch?

450 0

  • 1
    Wretch connects two networks at data link layer
    Correct
    Wrong
  • 2
    Router is more useful
    Correct
    Wrong
  • 3
    Router connects two networks at the Network Layer.
    Correct
    Wrong
  • 4
    both (a) and (c)
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "both (a) and (c)"

Q:

The expanded form of BCC used in e-mail communication is:

449 0

  • 1
    Blue carbon copy
    Correct
    Wrong
  • 2
    Blind carbon copy
    Correct
    Wrong
  • 3
    Black carbon copy
    Correct
    Wrong
  • 4
    Back carbon copy
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Blind carbon copy"
Explanation :

1. Blind carbon copy is the extended form of BCC used in e-mail communication.

2. It is used to send a copy of an email to a person without informing the recipient about it i.e. the identity of the recipient mentioned in the 'Bcc field' is hidden from other recipients receiving the same email.

3. Recipients in the BCC list can see every other email address, including the To and CC lists.

Q:

Through _______ can you link any location of the current document to another document or website?

446 0

  • 1
    Link
    Correct
    Wrong
  • 2
    Hyperlink
    Correct
    Wrong
  • 3
    Database
    Correct
    Wrong
  • 4
    Form
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Hyperlink"
Explanation :

1. Through hyper link you can connect any location of the current document to another document or website.

2. Hypers are found in almost all web pages. Links allow users to click from one page to another.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully