Computer GK Practice Question and Answer
8 Q: Junk e-mail is called:
559 064a540acb394764d11b18bdf
64a540acb394764d11b18bdf- 1Spamtrue
- 2Spooffalse
- 3Sniffer scriptfalse
- 4Spoolfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Spam"
Explanation :
1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.
2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.
Q: BHIM app is available in ______ languages.
558 063e9f0dcb4202b4767d25ab7
63e9f0dcb4202b4767d25ab7- 111false
- 212false
- 313true
- 415false
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "13"
Q: What is the memory used by RAM to store frequently used information?
557 064ba5ca1c3da05b2213e6b05
64ba5ca1c3da05b2213e6b05- 1Main memoryfalse
- 2Cache memorytrue
- 3Registerfalse
- 4Romefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Cache memory"
Explanation :
1. The memory which is used by RAM to store frequently used information is called cache memory.
2. Cache memory is much smaller than RAM, but it is much faster than RAM.
3. Recently used information is often stored in cache memory.
Q: Which statement is true for Router and Wretch?
556 063edfee03c221e1b4dd138d6
63edfee03c221e1b4dd138d6- 1Wretch connects two networks at data link layerfalse
- 2Router is more usefulfalse
- 3Router connects two networks at the Network Layer.false
- 4both (a) and (c)true
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "both (a) and (c)"
Q: What should be used if a company wants to include its company name and logo at the bottom of each page of the brochure?
555 064a565b88ecb104cc6265e2f
64a565b88ecb104cc6265e2f- 1Headerfalse
- 2Macrofalse
- 3Footertrue
- 4None of thesefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Footer"
Explanation :
1. If a company wants to include its company name and logo at the bottom of each page of the brochure, the footer is to be used.
2. Inserting a header or footer in MS Word is a simple process that can be completed in just a few steps.
- Open the document in MS Word in which you want to insert a header or footer.
- Click on the “Insert” tab at the top of the MS Word window which is to the right of the Home tab. You can also open the insert tab by pressing the MS Word shortcut key “Alt+N”.
- In the “Header & Footer” group, click the “header” or “footer” button, depending on what you want to insert into your document.
- A menu will appear with various header and footer options. Select the desired option and then click “OK”.
- Header or Footer will now be inserted into your document. You can type directly into it or add images and other content as desired. When you're finished, click outside the header or footer area to return to the document.
Q: Which of the following is not a characteristic of a computer system?
554 064b91ddae2108a7239350962
64b91ddae2108a7239350962- 1Diversityfalse
- 2Chastityfalse
- 3Speedfalse
- 4Ability to thinktrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "Ability to think"
Explanation :
1. A computer is an electronic machine, which presents the required information or result (Output) by doing a specialized process according to a series of instructions (Program) given on the prescribed data (Input).
2. The following are the main characteristics of a computer.
(1) Speed
(2) Accuracy
(3) Economy
(4) Reliability
(5) Storage & Retrieval
(6) Repeated Processing Capacity Q: Which of the following methods is used to secure and protect sensitive data on computer systems?
553 06493fcedab3c5fffc2cc5018
6493fcedab3c5fffc2cc5018- 1encryptiontrue
- 2Defragmentationfalse
- 3Formattingfalse
- 4rebootingfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "encryption"
Explanation :
1. Encryption is the process of encoding data in cryptography.
2. This process transforms the plaintext or original representation of data into ciphertext or alternative representation of the data.
3. Only authorized parties should be able to decipher the ciphertext back into plaintext and access the original data.
4. Encryption in itself does not prevent interference, but it hinders interceptors from deciphering the content.
Q: Which of the following is responsible for locating the domain name and translating it into Internet Protocol (IP) protocol?
552 064ba61bb88d5e4f52de38524
64ba61bb88d5e4f52de38524- 1HTTPtrue
- 2HTTPSfalse
- 3DNMfalse
- 4URLfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "HTTP"
Explanation :
1. HTTP is responsible for locating the domain name and translating it into Internet Protocol S.
2. IP address (Internet Protocol address) is a digital address used to identify a computer or device on the Internet or any other network.