Computer GK Practice Question and Answer
8 Q: Which of the following is not a type of Cyber Threat?
1120 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.
Q: Name the two categories of computer software that can be classified?
1120 063e4db94124b1363b8ec2791
63e4db94124b1363b8ec2791- 1system software and application softwaretrue
- 2hard software and soft softwarefalse
- 3game software and math softwarefalse
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "system software and application software"
Q: What type of software is Raj e-Wallet?
1115 064b9166d88d5e4f52ddf9ed1
64b9166d88d5e4f52ddf9ed1- 1Document Management Systemtrue
- 2Network Management Systemfalse
- 3Software Management Systemfalse
- 4None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Document Management System"
Explanation :
1. Rajasthan Government has started the online service of “Raj e-Vault”.
2. The Rajasthan Government has launched a digital document manager in the form of an online portal “Raj e-Vault”
3. Once you have created your e-vault, all the documents which are related to the government.
4. Visit the official website of Raj e-Vault using your Aadhaar ID; An OTP will be sent to your registered mobile number. Enter the OTP and start uploading your documents.
Q: Which statement is used for more than one True and False statement?
1113 063ede524b0030e718d7fc09c
63ede524b0030e718d7fc09c- 1if elsefalse
- 2else iffalse
- 3Nestedfalse
- 4(b) and (c) bothtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "(b) and (c) both"
Q: Which connectivity is required for the HotSpot internet connectivity?
1109 06494375bdad6f2e01f5b89a0
6494375bdad6f2e01f5b89a0- 1Wi-Fitrue
- 2Inductionfalse
- 3Infraredfalse
- 4All of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Wi-Fi"
Explanation :
A Hotspot is required for internet connectivity.
1. Dial-up is generally the slowest Internet connection and is obsolete these days.
2. This high-speed Internet connection is usually provided by telephone companies.
3. Wi-Fi (Wireless Fidelity) is a technology for WLAN (Wireless Local Area Networking) which requires "radio frequency" to transmit to devices.
4. Digital Subscriber Line (DSL-Digital Subscriber Line) service uses a broadband connection, which makes it faster than dial-up.
5. Cable service connects to the Internet through Cable TV.
6. Internet services are provided by mobile operators through mobile phone connections. 3G and 4G services are most commonly used with mobile phones and tablet computers.
Q: A file that uses preset settings for a normal presentation station (presentation/document) is done in the making is called ______?
1108 064ba5d8ac3da05b2213e7466
64ba5d8ac3da05b2213e7466- 1Patternfalse
- 2Modelfalse
- 3Templatetrue
- 4Blueprintfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Template"
Explanation :
1. A file that contains a template for a simple presentation using predefined settings.
- Presentation: Using the template, you can create a professional presentation that will grab attention and impress your audience.
- Document: Using templates, you can create a professional document that is well-written and well-organized.
- Email: Using the template, you can create a professional email that will attract attention and get your response.
- Web page: Using the template, you can create a professional web page that is beautiful and easy to use.
Q: In a _______, a parent record type can be associated with one or more "child" record types, but a child record type can have only one parent.
1105 063e9ed089353301b5cd70ce7
63e9ed089353301b5cd70ce7- 1network databasefalse
- 2relational databasefalse
- 3distributed databasefalse
- 4hierarchical databasetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "hierarchical database"
Explanation :
In a hierarchical database model, a parent record type can be associated with one or more child record types, but a child record type can have only one parent. This hierarchical structure is represented as a tree-like schema, where each parent record can have multiple child records, but each child record has only one parent. This model is useful for representing data with hierarchical relationships, such as organizational structures or file systems.
Q: Choose the most appropriate option from the following:
1102 064a519b4b394764d11b0c1f4
64a519b4b394764d11b0c1f4- 1An electronic payment system using debit cards and credit cards can be done intrue
- 2OMR is for magnetic readers only.false
- 3Skype is an example of system software.false
- 4The output quality of a printer is measured in Hertz.false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "An electronic payment system using debit cards and credit cards can be done in"
Explanation :
An electronic payment system using debit cards and credit cards can be done in

