Computer GK Practice Question and Answer
8 Q: The number of rows in Excel 2003 is ______.
817 063ecd224e6cd351b75fdc8a1
63ecd224e6cd351b75fdc8a1- 165535false
- 265536true
- 365534false
- 465533false
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "65536"
Explanation :
In Excel 2003, the number of rows is 65,536. Each worksheet in Excel 2003 consists of 65,536 rows and 256 columns.
Q: What is virus that spreads in computer?
825 063ecd3090fa4111f87e15c9e
63ecd3090fa4111f87e15c9e- 1It is hardwarefalse
- 2It is a computer programtrue
- 3It is system softwarefalse
- 4It is a windows toolfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "It is a computer program"
Explanation :
a virus that spreads in a computer is a type of malicious computer program. Computer viruses are software programs designed to replicate themselves and spread from one computer to another. They can attach themselves to legitimate programs or documents, and when the infected program or document is executed, the virus activates and starts spreading to other files and systems. Viruses can cause various harmful effects, such as corrupting or deleting files, stealing sensitive information, or disrupting computer operations. Antivirus software and best practices, such as avoiding suspicious downloads and email attachments, are used to protect computers from these malicious programs.
Q: What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?
647 063ecd35b0fa4111f87e15cb8
63ecd35b0fa4111f87e15cb8- 1Computer virusfalse
- 2Phishing Scamstrue
- 3Spyware Scamsfalse
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Phishing Scams"
Explanation :
The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.
Q: When does Time Bomb happen?
701 063ecd39e3c221e1b4dce5a32
63ecd39e3c221e1b4dce5a32- 1during a particular logic and datafalse
- 2during a particular date or timetrue
- 3during a particular timefalse
- 4none of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "during a particular date or time"
Explanation :
it can be programmed to activate during a particular date or time, making it a significant threat if it goes undetected until the specified trigger conditions are met. Time bombs are often used by attackers to initiate their malicious activities at a specific moment, adding an element of surprise and making it difficult to prevent or mitigate the damage.
Q: Delayed payload of some virus is called-
1021 063ecd3f90fa4111f87e15e1b
63ecd3f90fa4111f87e15e1b- 1Timefalse
- 2Anti-virusfalse
- 3Bombtrue
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Bomb"
Explanation :
In the context of computer viruses or malware, a time bomb is a type of malicious code that is programmed to execute a harmful action at a specific date and time or after a certain period has elapsed. This delayed activation makes it challenging to detect and prevent the attack until it's too late.
Q: With which of the following is the Break statement used?
686 063ede5893c221e1b4dd104fd
63ede5893c221e1b4dd104fd- 1if Statementfalse
- 2else if Statementfalse
- 3Switch Statementtrue
- 4None of thesefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Switch Statement"
Explanation :
The break statement is used with loops (such as for and while loops) and switch statements in programming. In loops, it is used to exit the loop prematurely, while in a switch statement, it is used to exit the switch block after executing a specific case.
Q: What is it called when more than one if-statement is used together?
645 063ede4ad7312b71d33e25815
63ede4ad7312b71d33e25815- 1if-else statementfalse
- 2nested statementtrue
- 3more if statementsfalse
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "nested statement"
Explanation :
Certainly! A nested if statement refers to an if statement that is placed inside another if statement or other control structures. It allows for more specific conditions and complex decision-making in a program. The inner if statement is only executed if the outer if statement's condition is true.
Q: Which of the following is not an OS?
766 063eccaa335d86258ec99eed4
63eccaa335d86258ec99eed4- 1DOSfalse
- 2MUStrue
- 3UNIXfalse
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "MUS"
Explanation :
"MUS" is not a recognized operating system abbreviation in common use. Operating systems are software programs that manage computer hardware and provide services for computer programs. Examples of well-known operating systems include Windows, macOS, Linux, and Unix. "MUS" does not correspond to any widely used operating system.