Computer GK Practice Question and Answer

Q:

Which subnet is used for LAN security to bring stability in the Internet network?

701 0

  • 1
    static router
    Correct
    Wrong
  • 2
    dynamic router
    Correct
    Wrong
  • 3
    static switch
    Correct
    Wrong
  • 4
    dynamic switch
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "static router"

Q:

Which of the following is not a type of Cyber Threat?

700 0

  • 1
    Hunting
    Correct
    Wrong
  • 2
    Fishing
    Correct
    Wrong
  • 3
    Spy
    Correct
    Wrong
  • 4
    Hacking
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "Hunting"
Explanation :

There are many types of cyber threats, including:

1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.

2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.

3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.

4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.

5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.

6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.

7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.

8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.

9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

Q:

Microprocessor as a switching device is for which generation of computers?

698 0

  • 1
    first generation
    Correct
    Wrong
  • 2
    second generation
    Correct
    Wrong
  • 3
    third generation
    Correct
    Wrong
  • 4
    fourth generation
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "fourth generation"

Q:

Which of the following devices tells the difference between multicast and unicast packets?

697 0

  • 1
    multicast switch
    Correct
    Wrong
  • 2
    developed
    Correct
    Wrong
  • 3
    advanced router
    Correct
    Wrong
  • 4
    multicast router
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "multicast switch"
Explanation :

Multicast switch


Q:

Name the two categories of computer software that can be classified?

693 0

  • 1
    system software and application software
    Correct
    Wrong
  • 2
    hard software and soft software
    Correct
    Wrong
  • 3
    game software and math software
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 1. "system software and application software"

Q:

What is the use of the Shift + F3 shortcut key in MS Excel 2010?

691 0

  • 1
    To insert an image
    Correct
    Wrong
  • 2
    To open a new sheet
    Correct
    Wrong
  • 3
    To save the current sheet
    Correct
    Wrong
  • 4
    To include the function
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "To include the function"
Explanation :

1. What is the Shift + F3 shortcut key used in MS Excel 2010 to insert the insert function?

2. In the Function window, you can see all the functions available in Excel.

Q:

Hyperlink has parts?

689 0

  • 1
    Address of the webpage
    Correct
    Wrong
  • 2
    e-mail address
    Correct
    Wrong
  • 3
    any other link text or image
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 4. "All of the above "

Q:

What is the shortcut key to open File Explorer or File Manager?

688 0

  • 1
    Ctrl + N
    Correct
    Wrong
  • 2
    Ctrl + O
    Correct
    Wrong
  • 3
    Ctrl + E
    Correct
    Wrong
  • 4
    Ctrl + F
    Correct
    Wrong
  • Show Answer
  • Workspace

Answer : 2. "Ctrl + O"
Explanation :

1. The shortcut key to open File Explorer or File Manager is Ctrl + O.

2. In Microsoft Excel and all other spreadsheet programs, pressing Ctrl+O brings up the Open window, allowing you to load an existing spreadsheet stored on your computer.

3. In Microsoft Word and other word processors, pressing Ctrl+O brings up the Open window, allowing you to load an existing document stored on your computer.

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully

  Report Error

Please Enter Message
Error Reported Successfully