Computer GK Practice Question and Answer
8 Q: Which of the following statements is true?
(I) Primary storage units have faster access time and less storage capacity than secondary storage units.
(II) Primary storage units have sequential access.
(III) Secondary storage units are non-volatile storage.
711 064a515518ecb104cc62515e1
64a515518ecb104cc62515e1(I) Primary storage units have faster access time and less storage capacity than secondary storage units.
(II) Primary storage units have sequential access.
(III) Secondary storage units are non-volatile storage.
- 1(I) and (II) onlyfalse
- 2(I) and (III) onlytrue
- 3(II) and (III) onlyfalse
- 4All (I), (II) and (III)false
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "(I) and (III) only"
Explanation :
All of the following statements are true.
(I) Primary storage units have faster access time and less storage capacity than secondary storage units.
(II) Secondary storage units are non-volatile storage.
Q: ______ is used to transmit network data?
708 064ba7665e2108a7239398369
64ba7665e2108a7239398369- 1Microwavefalse
- 2Infraredfalse
- 3Radio Channelfalse
- 4All of the Abovetrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "All of the Above"
Explanation :
The following devices are used to transmit network data.
- Microwave (Microweb)
- Infrared
- Radio Channel
Q: Which of the following is not an example of an output device?
708 063e4d50bc386f46a0a6f2863
63e4d50bc386f46a0a6f2863- 1Monitorfalse
- 2printerfalse
- 3Plotterfalse
- 4Keyboardtrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "Keyboard"
Q: Which things are used together to add duplicate slides in the presentation of PowerPoint?
704 064ba776ce2108a7239398525
64ba776ce2108a7239398525- 1Ctrl + Xfalse
- 2Ctrl + Nfalse
- 3Ctrl + Mtrue
- 4Ctrl + Zfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Ctrl + M"
Explanation :
1. In MS PowerPoint, CTRL+M is a shortcut key used to insert a blank slide after the currently selected slide.
2. MS PowerPoint is a presentation program used to display data with the use of pictures, graphs, etc. in the form of slides.
3. It was created by Robert Gaskins and Dennis Austin.
Q: What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?
700 063ecd35b0fa4111f87e15cb8
63ecd35b0fa4111f87e15cb8- 1Computer virusfalse
- 2Phishing Scamstrue
- 3Spyware Scamsfalse
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Phishing Scams"
Explanation :
The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.
Q: A file that uses preset settings for a normal presentation station (presentation/document) is done in the making is called ______?
698 064ba5d8ac3da05b2213e7466
64ba5d8ac3da05b2213e7466- 1Patternfalse
- 2Modelfalse
- 3Templatetrue
- 4Blueprintfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Template"
Explanation :
1. A file that contains a template for a simple presentation using predefined settings.
- Presentation: Using the template, you can create a professional presentation that will grab attention and impress your audience.
- Document: Using templates, you can create a professional document that is well-written and well-organized.
- Email: Using the template, you can create a professional email that will attract attention and get your response.
- Web page: Using the template, you can create a professional web page that is beautiful and easy to use.
Q: Which subnet is used for LAN security to bring stability in the Internet network?
698 063e62d813c221e1b4dbd9282
63e62d813c221e1b4dbd9282- 1static routertrue
- 2dynamic routerfalse
- 3static switchfalse
- 4dynamic switchfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: What is the complete form of Irctc?
695 064b922d088d5e4f52ddfcf8c
64b922d088d5e4f52ddfcf8c- 1Indian Railway Corporation and Tourist Companyfalse
- 2Indian Rail Catering and Tourism Companyfalse
- 3Indian Railway Catering and Tourism Corporationtrue
- 4None of the abovefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Indian Railway Catering and Tourism Corporation"
Explanation :
1. Full form of IRCTC is Indian Railway Catering and Tourism Corporation.
2. The website https://www.irctc.co.in belongs to Indian Railways.
3. IRCTC has revolutionized the lives of the common man traveling by Indian Railways.
4. IRCTC online ticket booking system is a boon for the common man, empowering him through technology.