Computer GK Practice Question and Answer
8 Q: Which subnet is used for LAN security to bring stability in the Internet network?
701 063e62d813c221e1b4dbd9282
63e62d813c221e1b4dbd9282- 1static routertrue
- 2dynamic routerfalse
- 3static switchfalse
- 4dynamic switchfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "static router"
Q: Which of the following is not a type of Cyber Threat?
700 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.
Q: Microprocessor as a switching device is for which generation of computers?
698 063e4d31034b94188517b9528
63e4d31034b94188517b9528- 1first generationfalse
- 2second generationfalse
- 3third generationfalse
- 4fourth generationtrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "fourth generation"
Q: Which of the following devices tells the difference between multicast and unicast packets?
697 063e62d0b6149271af9b8c4c7
63e62d0b6149271af9b8c4c7- 1multicast switchtrue
- 2developedfalse
- 3advanced routerfalse
- 4multicast routerfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "multicast switch"
Explanation :
Multicast switch
Q: Name the two categories of computer software that can be classified?
693 063e4db94124b1363b8ec2791
63e4db94124b1363b8ec2791- 1system software and application softwaretrue
- 2hard software and soft softwarefalse
- 3game software and math softwarefalse
- 4None of thesefalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "system software and application software"
Q: What is the use of the Shift + F3 shortcut key in MS Excel 2010?
691 064942018187426e04966df1c
64942018187426e04966df1c- 1To insert an imagefalse
- 2To open a new sheetfalse
- 3To save the current sheetfalse
- 4To include the functiontrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "To include the function"
Explanation :
1. What is the Shift + F3 shortcut key used in MS Excel 2010 to insert the insert function?
2. In the Function window, you can see all the functions available in Excel.
Q: Hyperlink has parts?
689 064b931d4e2108a7239356442
64b931d4e2108a7239356442- 1Address of the webpagefalse
- 2e-mail addressfalse
- 3any other link text or imagefalse
- 4All of the abovetrue
- Show Answer
- Workspace
- SingleChoice
Answer : 4. "All of the above "
Q: What is the shortcut key to open File Explorer or File Manager?
688 06494296fc7d7c7e06717ec04
6494296fc7d7c7e06717ec04- 1Ctrl + Nfalse
- 2Ctrl + Otrue
- 3Ctrl + Efalse
- 4Ctrl + Ffalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Ctrl + O"
Explanation :
1. The shortcut key to open File Explorer or File Manager is Ctrl + O.
2. In Microsoft Excel and all other spreadsheet programs, pressing Ctrl+O brings up the Open window, allowing you to load an existing spreadsheet stored on your computer.
3. In Microsoft Word and other word processors, pressing Ctrl+O brings up the Open window, allowing you to load an existing document stored on your computer.