Computer GK Practice Question and Answer
8 4 Q:
63e62e47cc37d41b3f99ce68 4 Q:
63e62de99353301b5ccd84f8 4 Q:
63e62d813c221e1b4dbd9282 4 Q:
63e62957e6cd351b75ec9ba5 4 Q:
63e628a1cc37d41b3f99b6fb 4 Q:
63e6283ee6cd351b75ec9996 4 Q:
63e6103cc386f46a0a732c80 4 Q:
63e60631b67b1bb7ac77e50f
Q: Which of the following is the most difficult and secure device that LAN uses?
718 063e62e47cc37d41b3f99ce68
63e62e47cc37d41b3f99ce68- 1static routertrue
- 2IP Enabled Routerfalse
- 3dynamic routerfalse
- 4RIP enabled routerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?
559 063e62de99353301b5ccd84f8
63e62de99353301b5ccd84f8- 1an internal firewallfalse
- 2router between subnetsfalse
- 3individual switch for departmentfalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "all of the above"
Q: Which subnet is used for LAN security to bring stability in the Internet network?
527 063e62d813c221e1b4dbd9282
63e62d813c221e1b4dbd9282- 1static routertrue
- 2dynamic routerfalse
- 3static switchfalse
- 4dynamic switchfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: What is the name of those viruses which fool a user into downloading or executing them by pretending to be useful applications?
556 063e62957e6cd351b75ec9ba5
63e62957e6cd351b75ec9ba5- 1crackerfalse
- 2Trojan horsetrue
- 3wormfalse
- 4key loggerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Trojan horse"
Q: The virus that spreads in application software is called -
877 063e628a1cc37d41b3f99b6fb
63e628a1cc37d41b3f99b6fb- 1boot virusfalse
- 2macro virustrue
- 3antivirusfalse
- 4file virusfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "macro virus"
Q: How does Le-Hard Virus come into existence?
1683 063e6283ee6cd351b75ec9996
63e6283ee6cd351b75ec9996- 1hardwarefalse
- 2Softwarefalse
- 3command.comtrue
- 4FRIDAY 13false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "command.com"
Q: What is Trend Micro?
1196 063e6103cc386f46a0a732c80
63e6103cc386f46a0a732c80- 1this anti-virus softwaretrue
- 2this is virus programfalse
- 3it's just a programfalse
- 4none of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "this anti-virus software"
Q: The Ctrl + E command is used in PowerPoint.
4969 063e60631b67b1bb7ac77e50f
63e60631b67b1bb7ac77e50f- 1To move the text to the leftfalse
- 2To right the textfalse
- 3To center the texttrue
- 4all of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "To center the text"
en30234