Computer GK Practice Question and Answer

Q:

How many Pins are there in VGA Cable?

1238 0

  • 1
    11
    Correct
    Wrong
  • 2
    12
    Correct
    Wrong
  • 3
    17
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "None of these"
Explanation :

1. There are two types of VGA cables: 14-pin and 15-pin. 14-pin cables will work in most applications, but wider display compatibility may require a 15-pin cable.

Q:

What type of e commerce is Amazon?

1232 0

  • 1
    b2b
    Correct
    Wrong
  • 2
    b2c
    Correct
    Wrong
  • 3
    g2b
    Correct
    Wrong
  • 4
    g2c
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "b2c"

Q:

Which one of the following is not an operating system?

1231 0

  • 1
    Unix
    Correct
    Wrong
  • 2
    DOS
    Correct
    Wrong
  • 3
    Linux
    Correct
    Wrong
  • 4
    HP
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "HP"
Explanation :

1. An operating system is not HP.

2. The full name of HP is Hewlett-Packard. It is an American multinational information technology company that manufactures and sells computer hardware, software, and services.

Q:

______ is used to transmit network data?

1228 0

  • 1
    Microwave
    Correct
    Wrong
  • 2
    Infrared
    Correct
    Wrong
  • 3
    Radio Channel
    Correct
    Wrong
  • 4
    All of the Above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "All of the Above"
Explanation :

The following devices are used to transmit network data.

- Microwave (Microweb)

- Infrared

- Radio Channel

Q:

The full form of ISP is:

1228 0

  • 1
    Internet Speed Provider
    Correct
    Wrong
  • 2
    Internet Service Protocol
    Correct
    Wrong
  • 3
    Internet Service Provider
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Internet Service Provider"
Explanation :

1. IP address (Internet Protocol address) is a digital address used to identify a computer or device on the Internet or any other network.

2. IP address is a set of four numbers. It is in this format 191.150.1.38. Is visible in. The set of numbers for an IP address ranges from 0 to 255. That means the IP address ranges from 0.0.0.0 to 255.255.255.255.

Q:

Which of the following is not a type of Cyber Threat?

1227 0

  • 1
    Hunting
    Correct
    Wrong
  • 2
    Fishing
    Correct
    Wrong
  • 3
    Spy
    Correct
    Wrong
  • 4
    Hacking
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Hunting"
Explanation :

There are many types of cyber threats, including:

1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.

2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.

3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.

4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.

5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.

6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.

7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.

8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.

9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

Q:

Which command is used to remove a table from the database in SQL?

1226 0

  • 1
    DELETE TABLE
    Correct
    Wrong
  • 2
    DROP TABLE
    Correct
    Wrong
  • 3
    ERASE TABLE
    Correct
    Wrong
  • 4
    UNATTACH TABLE
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "DROP TABLE "
Explanation :

In SQL, the DROP TABLE command is used to remove a table from the database. When you execute DROP TABLE, it deletes the table along with all its data, indexes, triggers, constraints, and permissions. It should be used with caution as it permanently removes the table and all associated objects from the database.


Q:

A file that uses preset settings for a normal presentation station (presentation/document) is done in the making is called ______?

1225 0

  • 1
    Pattern
    Correct
    Wrong
  • 2
    Model
    Correct
    Wrong
  • 3
    Template
    Correct
    Wrong
  • 4
    Blueprint
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Template"
Explanation :

1. A file that contains a template for a simple presentation using predefined settings.

- Presentation: Using the template, you can create a professional presentation that will grab attention and impress your audience.

- Document: Using templates, you can create a professional document that is well-written and well-organized.

- Email: Using the template, you can create a professional email that will attract attention and get your response.

- Web page: Using the template, you can create a professional web page that is beautiful and easy to use.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully