Computer GK Practice Question and Answer

Q:

Junk e-mail is called:

559 0

  • 1
    Spam
    Correct
    Wrong
  • 2
    Spoof
    Correct
    Wrong
  • 3
    Sniffer script
    Correct
    Wrong
  • 4
    Spool
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "Spam"
Explanation :

1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.

2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.

Q:

BHIM app is available in ______ languages.

558 0

  • 1
    11
    Correct
    Wrong
  • 2
    12
    Correct
    Wrong
  • 3
    13
    Correct
    Wrong
  • 4
    15
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 3. "13"

Q:

What is the memory used by RAM to store frequently used information?

557 0

  • 1
    Main memory
    Correct
    Wrong
  • 2
    Cache memory
    Correct
    Wrong
  • 3
    Register
    Correct
    Wrong
  • 4
    Rome
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 2. "Cache memory"
Explanation :

1. The memory which is used by RAM to store frequently used information is called cache memory.

2. Cache memory is much smaller than RAM, but it is much faster than RAM.

3. Recently used information is often stored in cache memory.

Q:

Which statement is true for Router and Wretch?

556 0

  • 1
    Wretch connects two networks at data link layer
    Correct
    Wrong
  • 2
    Router is more useful
    Correct
    Wrong
  • 3
    Router connects two networks at the Network Layer.
    Correct
    Wrong
  • 4
    both (a) and (c)
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "both (a) and (c)"

Q:

What should be used if a company wants to include its company name and logo at the bottom of each page of the brochure?

555 0

  • 1
    Header
    Correct
    Wrong
  • 2
    Macro
    Correct
    Wrong
  • 3
    Footer
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 3. "Footer"
Explanation :

1. If a company wants to include its company name and logo at the bottom of each page of the brochure, the footer is to be used.

2. Inserting a header or footer in MS Word is a simple process that can be completed in just a few steps.

- Open the document in MS Word in which you want to insert a header or footer.

- Click on the “Insert” tab at the top of the MS Word window which is to the right of the Home tab. You can also open the insert tab by pressing the MS Word shortcut key “Alt+N”.

- In the “Header & Footer” group, click the “header” or “footer” button, depending on what you want to insert into your document.

- A menu will appear with various header and footer options. Select the desired option and then click “OK”.

- Header or Footer will now be inserted into your document. You can type directly into it or add images and other content as desired. When you're finished, click outside the header or footer area to return to the document.

Q:

Which of the following is not a characteristic of a computer system?

554 0

  • 1
    Diversity
    Correct
    Wrong
  • 2
    Chastity
    Correct
    Wrong
  • 3
    Speed
    Correct
    Wrong
  • 4
    Ability to think
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "Ability to think"
Explanation :

1. A computer is an electronic machine, which presents the required information or result (Output) by doing a specialized process according to a series of instructions (Program) given on the prescribed data (Input).

2. The following are the main characteristics of a computer.

(1) Speed

(2) Accuracy

(3) Economy

(4) Reliability

(5) Storage & Retrieval

(6) Repeated Processing Capacity

Q:

Which of the following methods is used to secure and protect sensitive data on computer systems?

553 0

  • 1
    encryption
    Correct
    Wrong
  • 2
    Defragmentation
    Correct
    Wrong
  • 3
    Formatting
    Correct
    Wrong
  • 4
    rebooting
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "encryption"
Explanation :

1. Encryption is the process of encoding data in cryptography.

2. This process transforms the plaintext or original representation of data into ciphertext or alternative representation of the data.

3. Only authorized parties should be able to decipher the ciphertext back into plaintext and access the original data.

4. Encryption in itself does not prevent interference, but it hinders interceptors from deciphering the content.

Q:

Which of the following is responsible for locating the domain name and translating it into Internet Protocol (IP) protocol?

552 0

  • 1
    HTTP
    Correct
    Wrong
  • 2
    HTTPS
    Correct
    Wrong
  • 3
    DNM
    Correct
    Wrong
  • 4
    URL
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "HTTP"
Explanation :

1. HTTP is responsible for locating the domain name and translating it into Internet Protocol S.

2. IP address (Internet Protocol address) is a digital address used to identify a computer or device on the Internet or any other network.

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully