Computer GK Practice Question and Answer
8 Q: How many Pins are there in VGA Cable?
1238 064942bfd13e8bde03235b582
64942bfd13e8bde03235b582- 111false
- 212false
- 317false
- 4None of thesetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "None of these"
Explanation :
1. There are two types of VGA cables: 14-pin and 15-pin. 14-pin cables will work in most applications, but wider display compatibility may require a 15-pin cable.
Q: What type of e commerce is Amazon?
1232 063e9f81ae6cd351b75f689df
63e9f81ae6cd351b75f689df- 1b2bfalse
- 2b2ctrue
- 3g2bfalse
- 4g2cfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "b2c"
Q: Which one of the following is not an operating system?
1231 064a51284dc607a4d2b27b1ac
64a51284dc607a4d2b27b1ac- 1Unixfalse
- 2DOSfalse
- 3Linuxfalse
- 4HPtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "HP"
Explanation :
1. An operating system is not HP.
2. The full name of HP is Hewlett-Packard. It is an American multinational information technology company that manufactures and sells computer hardware, software, and services.
Q: ______ is used to transmit network data?
1228 064ba7665e2108a7239398369
64ba7665e2108a7239398369- 1Microwavefalse
- 2Infraredfalse
- 3Radio Channelfalse
- 4All of the Abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of the Above"
Explanation :
The following devices are used to transmit network data.
- Microwave (Microweb)
- Infrared
- Radio Channel
Q: The full form of ISP is:
1228 064a514b98c254a4ceacd8a87
64a514b98c254a4ceacd8a87- 1Internet Speed Providerfalse
- 2Internet Service Protocolfalse
- 3Internet Service Providertrue
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Internet Service Provider"
Explanation :
1. IP address (Internet Protocol address) is a digital address used to identify a computer or device on the Internet or any other network.
2. IP address is a set of four numbers. It is in this format 191.150.1.38. Is visible in. The set of numbers for an IP address ranges from 0 to 255. That means the IP address ranges from 0.0.0.0 to 255.255.255.255.
Q: Which of the following is not a type of Cyber Threat?
1227 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.
Q: Which command is used to remove a table from the database in SQL?
1226 063e9ee077312b71d33d794fb
63e9ee077312b71d33d794fb- 1DELETE TABLEfalse
- 2DROP TABLEtrue
- 3ERASE TABLEfalse
- 4UNATTACH TABLEfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "DROP TABLE "
Explanation :
In SQL, the DROP TABLE command is used to remove a table from the database. When you execute DROP TABLE, it deletes the table along with all its data, indexes, triggers, constraints, and permissions. It should be used with caution as it permanently removes the table and all associated objects from the database.
Q: A file that uses preset settings for a normal presentation station (presentation/document) is done in the making is called ______?
1225 064ba5d8ac3da05b2213e7466
64ba5d8ac3da05b2213e7466- 1Patternfalse
- 2Modelfalse
- 3Templatetrue
- 4Blueprintfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Template"
Explanation :
1. A file that contains a template for a simple presentation using predefined settings.
- Presentation: Using the template, you can create a professional presentation that will grab attention and impress your audience.
- Document: Using templates, you can create a professional document that is well-written and well-organized.
- Email: Using the template, you can create a professional email that will attract attention and get your response.
- Web page: Using the template, you can create a professional web page that is beautiful and easy to use.

