Computer GK Practice Question and Answer
8Q: Tally package is developed by 15048 05b5cc672e4d2b4197774c0ce
5b5cc672e4d2b4197774c0ce- 1Tally Solutionstrue
- 2Coral Softwaresfalse
- 3Vedika Softwaresfalse
- 4Peutronicsfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Tally Solutions"
Explanation :
Answer: A) Tally Solutions Explanation: Tally package is developed by Tally Solutions. Tally Solutions, then known as Peutronics, was co-founded in 1986 by Shyam Sunder Goenka and his son Bharat Goenka.
Q: Is the correct detailed form of the term http in internet address?
7374 15f64466da372fb536711a2c1
5f64466da372fb536711a2c1- 1higher text transfer protocolfalse
- 2higher transfer tex protocolfalse
- 3hybrid text transfer protocolfalse
- 4hyper text transfer protocoltrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "hyper text transfer protocol"
Q: The Ctrl + E command is used in PowerPoint.
4963 063e60631b67b1bb7ac77e50f
63e60631b67b1bb7ac77e50f- 1To move the text to the leftfalse
- 2To right the textfalse
- 3To center the texttrue
- 4all of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "To center the text"
Q: How many bytes are 1 gigabyte (GB)?
4736 15f6445e4becdf06fd264d529
5f6445e4becdf06fd264d529- 11024 KBfalse
- 21024 MBtrue
- 31024 GBfalse
- 41024 TBfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "1024 MB"
Q: The work done on the Internet is called -
2728 063e6318eef10d51b16bfed52
63e6318eef10d51b16bfed52- 1surfingtrue
- 2Gamblingfalse
- 3both a and Bfalse
- 4none of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "surfing"
Q: Which of the following is an open source (free to all) mobile OS?
1796 061c583dee343c02767855ac7
61c583dee343c02767855ac7- 1Wi-Fifalse
- 2Inductionfalse
- 3Infraredfalse
- 4All of thesetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of these"
Explanation :
An open source (free for all) low connectivity requirement.
- Wi-Fi
- Induction
- infrared Q: How does Le-Hard Virus come into existence?
1677 063e6283ee6cd351b75ec9996
63e6283ee6cd351b75ec9996- 1hardwarefalse
- 2Softwarefalse
- 3command.comtrue
- 4FRIDAY 13false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "command.com"
Q: Which computer virus records every movement you make on the computer?
1464 163bfed2d74eba5069d5bfa4a
63bfed2d74eba5069d5bfa4a- 1Malware Androidfalse
- 2DoSfalse
- 3Key Loggertrue
- 4Trapperfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Key Logger "
Explanation :
A keylogger (short for keystroke logger) is a type of computer virus or malware that records every keystroke and movement made on a computer's keyboard, including sensitive information such as passwords, credit card numbers, and personal messages. It essentially captures the user's keystrokes without their knowledge and sends this information to the attacker, posing a significant security threat.