Computer GK Practice Question and Answer
8 Q: What is it called when more than one if-statement is used together?
1343 063ede4ad7312b71d33e25815
63ede4ad7312b71d33e25815- 1if-else statementfalse
- 2nested statementtrue
- 3more if statementsfalse
- 4None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "nested statement"
Explanation :
Certainly! A nested if statement refers to an if statement that is placed inside another if statement or other control structures. It allows for more specific conditions and complex decision-making in a program. The inner if statement is only executed if the outer if statement's condition is true.
Q: Windows 8 is part of the ……… family of operating systems.
1341 063eccc59aa2a114c951edf75
63eccc59aa2a114c951edf75- 1Windows APfalse
- 2Windows NTtrue
- 3Windows 8xfalse
- 4Windows NETfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Windows NT"
Explanation :
Windows 8 is part of the Windows NT family of operating systems. Windows NT is a family of operating systems produced by Microsoft, which includes Windows NT 3.1, Windows NT 3.5, Windows NT 4.0, Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, and Windows 10. The Windows NT architecture is known for its stability, security, and advanced features, making it suitable for both personal and enterprise use.
Q: Which components are used in LAN for Ethernet?
1336 063edff5de6cd351b7500c59c
63edff5de6cd351b7500c59c- 1COAXfalse
- 2Fiberfalse
- 3STPfalse
- 4All of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of the above"
Explanation :
All three components—COAX (coaxial cables), Fiber (optical fiber cables), and STP (shielded twisted pair cables)—can be used in LANs for Ethernet connectivity, depending on specific network requirements and conditions. Different types of Ethernet cables, including coaxial, fiber optic, and shielded twisted pair, are used based on factors such as data transfer speed, distance, and susceptibility to electromagnetic interference.
Q: When does Time Bomb happen?
1323 063ecd39e3c221e1b4dce5a32
63ecd39e3c221e1b4dce5a32- 1during a particular logic and datafalse
- 2during a particular date or timetrue
- 3during a particular timefalse
- 4none of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "during a particular date or time"
Explanation :
it can be programmed to activate during a particular date or time, making it a significant threat if it goes undetected until the specified trigger conditions are met. Time bombs are often used by attackers to initiate their malicious activities at a specific moment, adding an element of surprise and making it difficult to prevent or mitigate the damage.
Q: The extension of MS Excel's workbook or file is-
1321 063ecce3faa2a114c951ee1ae
63ecce3faa2a114c951ee1ae- 1.DOCfalse
- 2.XLXfalse
- 3.XLCfalse
- 4.XLSXtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. ".XLSX"
Q: What is computer software?
1320 063e4daba2cab94e8399ef223
63e4daba2cab94e8399ef223- 1set of instructionstrue
- 2computer languagefalse
- 3computer programsfalse
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "set of instructions"
Q: It is an electronic card in which a microchip is attached, through which it stores personal information and some data.
1319 063e9f12435d86258ec927703
63e9f12435d86258ec927703- 1Debit Cardfalse
- 2Credit Cardfalse
- 3smart cardtrue
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "smart card"
Q: Where is the recycle bin found?
1318 063e601a40cf671793fd2f658
63e601a40cf671793fd2f658- 1desktoptrue
- 2on hard drivefalse
- 3on the shortcut menufalse
- 4property dialog boxfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice

