Computer GK Questions Practice Question and Answer
8 4 Q:
61cdbfacedcf9307082e639b 4 Q:
61cdbecd8067f406dfe9e8a9 4 Q:
61cdbd1cedcf9307082e5f0f 4 Q:
61cdbc658067f406dfe9e2a7 4 Q:
61cdbb90edcf9307082e5a5b 4 Q:
61cdbaa7edcf9307082e58b2 4 Q:
61cdb97bedcf9307082e5411 4 Q:
61cdb8a6e638db77e7a3e36c
Q: Suppose a directory has sub directories and some files, what happens whenever you move that directory from one place to another?
1207 061cdbfacedcf9307082e639b
61cdbfacedcf9307082e639b- 1Only the files inside the directory are transferredfalse
- 2Only the sub directories inside the directory are moved.false
- 3Directories are moved but source files are not transferred.false
- 4The files and sub directories inside the directory are moved.true
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "The files and sub directories inside the directory are moved."
Q: . ……………… is a personal information manager, mainly used in email applications, and also includes calendar, task manager, note taking, magazine, web browsing?
730 061cdbecd8067f406dfe9e8a9
61cdbecd8067f406dfe9e8a9- 1MS Excelfalse
- 2MS Paintfalse
- 3MS Accessfalse
- 4MS Outlooktrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "MS Outlook"
Q: Which of the following CPU is part of?
517 061cdbd1cedcf9307082e5f0f
61cdbd1cedcf9307082e5f0f- 1ALU, CUtrue
- 2ALU, Mousefalse
- 3ALU, ICfalse
- 4CU, CUfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "ALU, CU"
Q: ……….. is used to send digital data over a telephone line?
592 061cdbc658067f406dfe9e2a7
61cdbc658067f406dfe9e2a7- 1Scannerfalse
- 2LANfalse
- 3Modemtrue
- 4pen drivefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Modem"
Q: What is the use of Shift + F3 shortcut key in MS-Excel 2010?
1347 061cdbb90edcf9307082e5a5b
61cdbb90edcf9307082e5a5b- 1to insert an imagefalse
- 2to open a new seatfalse
- 3To save the existing shitfalse
- 4to insert functiontrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "to insert function"
Q: A utility used to reduce the number of fragmented files and improve access speed?
1052 061cdbaa7edcf9307082e58b2
61cdbaa7edcf9307082e58b2- 1Disc lightfalse
- 2Data Defragmatortrue
- 3non-refragmaterfalse
- 4WPANfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Data Defragmator"
Q: Which of the following is a valid type of network topology
609 061cdb97bedcf9307082e5411
61cdb97bedcf9307082e5411- 1Bustrue
- 2Trainfalse
- 3Circlefalse
- 4Hexagonfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Bus"
Q: Which of the following is used in information security to prove the identity of the sender?
539 061cdb8a6e638db77e7a3e36c
61cdb8a6e638db77e7a3e36c- 1Confidentialityfalse
- 2Integrityfalse
- 3Authenticationtrue
- 4none of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Authentication"
en28322