Computer Knowledge Practice Question and Answer
8 4 Q:
63e631e77407bd1b2d1de604 4 Q:
63e6318eef10d51b16bfed52 4 Q:
63e62e47cc37d41b3f99ce68 4 Q:
63e62de99353301b5ccd84f8 4 Q:
63e62d813c221e1b4dbd9282 4 Q:
63e62957e6cd351b75ec9ba5 4 Q:
63e628a1cc37d41b3f99b6fb 4 Q:
63e6283ee6cd351b75ec9996
Q: What is the first name in an email address called?
543 063e631e77407bd1b2d1de604
63e631e77407bd1b2d1de604- 1domainfalse
- 2user idtrue
- 3Rangefalse
- 4none of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "user id"
Q: The work done on the Internet is called -
2742 063e6318eef10d51b16bfed52
63e6318eef10d51b16bfed52- 1surfingtrue
- 2Gamblingfalse
- 3both a and Bfalse
- 4none of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "surfing"
Q: Which of the following is the most difficult and secure device that LAN uses?
719 063e62e47cc37d41b3f99ce68
63e62e47cc37d41b3f99ce68- 1static routertrue
- 2IP Enabled Routerfalse
- 3dynamic routerfalse
- 4RIP enabled routerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?
560 063e62de99353301b5ccd84f8
63e62de99353301b5ccd84f8- 1an internal firewallfalse
- 2router between subnetsfalse
- 3individual switch for departmentfalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "all of the above"
Q: Which subnet is used for LAN security to bring stability in the Internet network?
528 063e62d813c221e1b4dbd9282
63e62d813c221e1b4dbd9282- 1static routertrue
- 2dynamic routerfalse
- 3static switchfalse
- 4dynamic switchfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: What is the name of those viruses which fool a user into downloading or executing them by pretending to be useful applications?
556 063e62957e6cd351b75ec9ba5
63e62957e6cd351b75ec9ba5- 1crackerfalse
- 2Trojan horsetrue
- 3wormfalse
- 4key loggerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Trojan horse"
Q: The virus that spreads in application software is called -
878 063e628a1cc37d41b3f99b6fb
63e628a1cc37d41b3f99b6fb- 1boot virusfalse
- 2macro virustrue
- 3antivirusfalse
- 4file virusfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "macro virus"
Q: How does Le-Hard Virus come into existence?
1684 063e6283ee6cd351b75ec9996
63e6283ee6cd351b75ec9996- 1hardwarefalse
- 2Softwarefalse
- 3command.comtrue
- 4FRIDAY 13false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "command.com"
en100239latest