Computer GK Practice Question and Answer

Q:

Which of the following statements is true?
 (I) Primary storage units have faster access time and less storage capacity than secondary storage units.
 (II) Primary storage units have sequential access.
 (III) Secondary storage units are non-volatile storage.

711 0

  • 1
    (I) and (II) only
    Correct
    Wrong
  • 2
    (I) and (III) only
    Correct
    Wrong
  • 3
    (II) and (III) only
    Correct
    Wrong
  • 4
    All (I), (II) and (III)
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 2. "(I) and (III) only"
Explanation :

All of the following statements are true.

(I) Primary storage units have faster access time and less storage capacity than secondary storage units.

(II) Secondary storage units are non-volatile storage.

Q:

______ is used to transmit network data?

708 0

  • 1
    Microwave
    Correct
    Wrong
  • 2
    Infrared
    Correct
    Wrong
  • 3
    Radio Channel
    Correct
    Wrong
  • 4
    All of the Above
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "All of the Above"
Explanation :

The following devices are used to transmit network data.

- Microwave (Microweb)

- Infrared

- Radio Channel

Q:

Which of the following is not an example of an output device?

708 0

  • 1
    Monitor
    Correct
    Wrong
  • 2
    printer
    Correct
    Wrong
  • 3
    Plotter
    Correct
    Wrong
  • 4
    Keyboard
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "Keyboard"

Q:

Which things are used together to add duplicate slides in the presentation of PowerPoint?

704 0

  • 1
    Ctrl + X
    Correct
    Wrong
  • 2
    Ctrl + N
    Correct
    Wrong
  • 3
    Ctrl + M
    Correct
    Wrong
  • 4
    Ctrl + Z
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 3. "Ctrl + M"
Explanation :

1. In MS PowerPoint, CTRL+M is a shortcut key used to insert a blank slide after the currently selected slide.

2. MS PowerPoint is a presentation program used to display data with the use of pictures, graphs, etc. in the form of slides.

3. It was created by Robert Gaskins and Dennis Austin.

Q:

What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?

700 0

  • 1
    Computer virus
    Correct
    Wrong
  • 2
    Phishing Scams
    Correct
    Wrong
  • 3
    Spyware Scams
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 2. "Phishing Scams"
Explanation :

The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.


Q:

A file that uses preset settings for a normal presentation station (presentation/document) is done in the making is called ______?

698 0

  • 1
    Pattern
    Correct
    Wrong
  • 2
    Model
    Correct
    Wrong
  • 3
    Template
    Correct
    Wrong
  • 4
    Blueprint
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 3. "Template"
Explanation :

1. A file that contains a template for a simple presentation using predefined settings.

- Presentation: Using the template, you can create a professional presentation that will grab attention and impress your audience.

- Document: Using templates, you can create a professional document that is well-written and well-organized.

- Email: Using the template, you can create a professional email that will attract attention and get your response.

- Web page: Using the template, you can create a professional web page that is beautiful and easy to use.

Q:

Which subnet is used for LAN security to bring stability in the Internet network?

698 0

  • 1
    static router
    Correct
    Wrong
  • 2
    dynamic router
    Correct
    Wrong
  • 3
    static switch
    Correct
    Wrong
  • 4
    dynamic switch
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "static router"

Q:

What is the complete form of Irctc?

695 0

  • 1
    Indian Railway Corporation and Tourist Company
    Correct
    Wrong
  • 2
    Indian Rail Catering and Tourism Company
    Correct
    Wrong
  • 3
    Indian Railway Catering and Tourism Corporation
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 3. "Indian Railway Catering and Tourism Corporation"
Explanation :

1. Full form of IRCTC is Indian Railway Catering and Tourism Corporation.

2. The website https://www.irctc.co.in belongs to Indian Railways.

3. IRCTC has revolutionized the lives of the common man traveling by Indian Railways.

4. IRCTC online ticket booking system is a boon for the common man, empowering him through technology.

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully