Computer Knowledge Practice Question and Answer

Q:

What is virus that spreads in computer?

624 0

  • 1
    It is hardware
    Correct
    Wrong
  • 2
    It is a computer program
    Correct
    Wrong
  • 3
    It is system software
    Correct
    Wrong
  • 4
    It is a windows tool
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "It is a computer program"
Explanation :

a virus that spreads in a computer is a type of malicious computer program. Computer viruses are software programs designed to replicate themselves and spread from one computer to another. They can attach themselves to legitimate programs or documents, and when the infected program or document is executed, the virus activates and starts spreading to other files and systems. Viruses can cause various harmful effects, such as corrupting or deleting files, stealing sensitive information, or disrupting computer operations. Antivirus software and best practices, such as avoiding suspicious downloads and email attachments, are used to protect computers from these malicious programs.

Q:

What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?

528 0

  • 1
    Computer virus
    Correct
    Wrong
  • 2
    Phishing Scams
    Correct
    Wrong
  • 3
    Spyware Scams
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Phishing Scams"
Explanation :

The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.


Q:

When does Time Bomb happen?

534 0

  • 1
    during a particular logic and data
    Correct
    Wrong
  • 2
    during a particular date or time
    Correct
    Wrong
  • 3
    during a particular time
    Correct
    Wrong
  • 4
    none of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "during a particular date or time"
Explanation :

it can be programmed to activate during a particular date or time, making it a significant threat if it goes undetected until the specified trigger conditions are met. Time bombs are often used by attackers to initiate their malicious activities at a specific moment, adding an element of surprise and making it difficult to prevent or mitigate the damage.

Q:

Delayed payload of some virus is called-

875 0

  • 1
    Time
    Correct
    Wrong
  • 2
    Anti-virus
    Correct
    Wrong
  • 3
    Bomb
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Bomb"
Explanation :

 In the context of computer viruses or malware, a time bomb is a type of malicious code that is programmed to execute a harmful action at a specific date and time or after a certain period has elapsed. This delayed activation makes it challenging to detect and prevent the attack until it's too late.

Q:

With which of the following is the Break statement used?

525 0

  • 1
    if Statement
    Correct
    Wrong
  • 2
    else if Statement
    Correct
    Wrong
  • 3
    Switch Statement
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Switch Statement"
Explanation :

The break statement is used with loops (such as for and while loops) and switch statements in programming. In loops, it is used to exit the loop prematurely, while in a switch statement, it is used to exit the switch block after executing a specific case.


Q:

What is it called when more than one if-statement is used together?

511 0

  • 1
    if-else statement
    Correct
    Wrong
  • 2
    nested statement
    Correct
    Wrong
  • 3
    more if statements
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "nested statement"
Explanation :

Certainly! A nested if statement refers to an if statement that is placed inside another if statement or other control structures. It allows for more specific conditions and complex decision-making in a program. The inner if statement is only executed if the outer if statement's condition is true.


Q:

Which of the following is not an OS?

604 0

  • 1
    DOS
    Correct
    Wrong
  • 2
    MUS
    Correct
    Wrong
  • 3
    UNIX
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "MUS"
Explanation :

"MUS" is not a recognized operating system abbreviation in common use. Operating systems are software programs that manage computer hardware and provide services for computer programs. Examples of well-known operating systems include Windows, macOS, Linux, and Unix. "MUS" does not correspond to any widely used operating system.

Q:

Which cobble is used to send modulated light?

639 0

  • 1
    Category 3 UTP
    Correct
    Wrong
  • 2
    Category 5 UTP
    Correct
    Wrong
  • 3
    fiber
    Correct
    Wrong
  • 4
    coax
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "fiber"
Explanation :

It seems there might be a confusion in your question. If you are referring to the technology used for transmitting data using modulated light, the term you are looking for is "fiber optic cable" or simply "fiber." Fiber optic cables are thin, flexible strands of glass or plastic that transmit data as modulated light pulses. They are widely used for high-speed data transmission over long distances due to their ability to carry large amounts of data with low attenuation and high bandwidth capabilities.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully