Computer GK Practice Question and Answer
8 Q: Compact Disc Recordable (CDR) is a _______.
1048 064a541c78c254a4ceace09e8
64a541c78c254a4ceace09e8- 1Road Aaj Diskfalse
- 2Write, erase, re-write discfalse
- 3Semi-conductor discfalse
- 4Write Once Road Many (WORM) Disktrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Write Once Road Many (WORM) Disk"
Explanation :
1. Compact Disc Recordable (CDR) is a write-once-read-many (WORM) disc.
2. CD-R stands for Compact Disc Recordable and is a digital optical disc storage format.
3. A CD-R disc is a compact disc that can be written once and read multiple times freely.
Q: Which of the following is not a type of Cyber Threat?
1045 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.
Q: In a _______, a parent record type can be associated with one or more "child" record types, but a child record type can have only one parent.
1038 063e9ed089353301b5cd70ce7
63e9ed089353301b5cd70ce7- 1network databasefalse
- 2relational databasefalse
- 3distributed databasefalse
- 4hierarchical databasetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "hierarchical database"
Explanation :
In a hierarchical database model, a parent record type can be associated with one or more child record types, but a child record type can have only one parent. This hierarchical structure is represented as a tree-like schema, where each parent record can have multiple child records, but each child record has only one parent. This model is useful for representing data with hierarchical relationships, such as organizational structures or file systems.
Q: A file that uses preset settings for a normal presentation station (presentation/document) is done in the making is called ______?
1037 064ba5d8ac3da05b2213e7466
64ba5d8ac3da05b2213e7466- 1Patternfalse
- 2Modelfalse
- 3Templatetrue
- 4Blueprintfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Template"
Explanation :
1. A file that contains a template for a simple presentation using predefined settings.
- Presentation: Using the template, you can create a professional presentation that will grab attention and impress your audience.
- Document: Using templates, you can create a professional document that is well-written and well-organized.
- Email: Using the template, you can create a professional email that will attract attention and get your response.
- Web page: Using the template, you can create a professional web page that is beautiful and easy to use.
Q: Which statement is used for more than one True and False statement?
1034 063ede524b0030e718d7fc09c
63ede524b0030e718d7fc09c- 1if elsefalse
- 2else iffalse
- 3Nestedfalse
- 4(b) and (c) bothtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "(b) and (c) both"
Q: Search engines perform the following tasks?
1033 064b9139ee154aff53380df03
64b9139ee154aff53380df03- 1Web crawlingfalse
- 2Indexingfalse
- 3Searchingfalse
- 4All of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of the above "
Explanation :
The search engine performs the following tasks-
1. Web crawling: Search engines search all web pages on the web using a crawler. A crawler is a program that finds new web pages by following links on the web.
2. Indexing: Once the crawler finds all the web pages, the search engine indexes them in a database. The index contains information for each web page, such as title, URL, and content.
3. Searching: When a user types a search query, the search engine searches all the web pages in the index that may be related to the query.
Q: What does the comment give for a cell entry to show on the screen?
1032 064b9196c2dc867f59303bf27
64b9196c2dc867f59303bf27- 1Commenttrue
- 2Indicatorfalse
- 3Picturefalse
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Comment"
Explanation :
The comment given for a cell entry displays the following information on the screen:
1. Comment text: The comment text is written by the person who is rating the item. This text may express the person's opinion or reaction to CellEntry.
2. Comment Rating: Comment rating is a numerical value that reflects the quality of the cell entry. Ratings usually range from 1 to 5, where 1 is the lowest and 5 is the highest.
3. Comment time: Comment time is the time when the comment was written.
Q: The full form of ISP is:
1031 064a514b98c254a4ceacd8a87
64a514b98c254a4ceacd8a87- 1Internet Speed Providerfalse
- 2Internet Service Protocolfalse
- 3Internet Service Providertrue
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Internet Service Provider"
Explanation :
1. IP address (Internet Protocol address) is a digital address used to identify a computer or device on the Internet or any other network.
2. IP address is a set of four numbers. It is in this format 191.150.1.38. Is visible in. The set of numbers for an IP address ranges from 0 to 255. That means the IP address ranges from 0.0.0.0 to 255.255.255.255.

