Computer Knowledge Practice Question and Answer

Q:

Which of the following is used in information security to prove the identity of the sender?

546 0

  • 1
    Confidentiality
    Correct
    Wrong
  • 2
    Integrity
    Correct
    Wrong
  • 3
    Authentication
    Correct
    Wrong
  • 4
    none of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Authentication"

Q:

What is Big Data?

553 0

  • 1
    It is used in MS Word 2010 to enhance the overall appearance of the document.
    Correct
    Wrong
  • 2
    A utility to copy formatting from one area in a worksheet and apply it to another area.
    Correct
    Wrong
  • 3
    It is a directory which is moved to the source directory.
    Correct
    Wrong
  • 4
    It is data sets that are so vast and complex that they can be used for traditional data processing applications. The software is insufficient to deal with it.
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "It is data sets that are so vast and complex that they can be used for traditional data processing applications. The software is insufficient to deal with it."

Q:

You can also charge your phone, tablet or other device wirelessly without having to physically plug it into the charging pad commonly known as:

627 0

  • 1
    inductive charging
    Correct
    Wrong
  • 2
    Mega Charging
    Correct
    Wrong
  • 3
    beta charging
    Correct
    Wrong
  • 4
    Giga Charging
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "inductive charging"

Q:

……… is a service model in which data is maintained, managed and backed up remotely and made available to users through a network.

909 0

  • 1
    Firewall
    Correct
    Wrong
  • 2
    fiber optics
    Correct
    Wrong
  • 3
    lifi
    Correct
    Wrong
  • 4
    Clyde Storage
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Clyde Storage"

Q:

DNS  service ……. translates into related.

967 0

  • 1
    IP address, domain name
    Correct
    Wrong
  • 2
    domain name, IP address
    Correct
    Wrong
  • 3
    Client, Server
    Correct
    Wrong
  • 4
    Folder, File
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Folder, File"

Q:

A small portion of the taskbar containing the icons of applications running in the background and displaying the date and time:

1348 0

  • 1
    Start Button
    Correct
    Wrong
  • 2
    Quick Launch
    Correct
    Wrong
  • 3
    Task Bar
    Correct
    Wrong
  • 4
    System
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "System"

Q:

An example of an output device is:

680 0

  • 1
    Scanner
    Correct
    Wrong
  • 2
    plotter
    Correct
    Wrong
  • 3
    tape
    Correct
    Wrong
  • 4
    Software
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "plotter"

Q:

What type of personal email account is typically used to download emails to your computer?

731 0

  • 1
    Microsoft Exchange
    Correct
    Wrong
  • 2
    POP-3
    Correct
    Wrong
  • 3
    IMAP
    Correct
    Wrong
  • 4
    HTTP
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "POP-3"

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully