Computer GK Practice Question and Answer
8 Q: The printed output from the computer is often called:
1005 064a5138f8ecb104cc62513db
64a5138f8ecb104cc62513db- 1Copyfalse
- 2Soft copyfalse
- 3Hard copytrue
- 4Paperfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Hard copy"
Explanation :
1. The output printed from the computer is called a hard copy.
2. “When we see any text or image or any design inside any computer software, then to make that design or text a document, with the help of a printer, with the help of a hard copy generator. If it is printed on paper, then that printed paper is called a Hard Copy”.
Q: Which inbuilt option of Windows 10 allows us to move up to four windows on one screen?
1005 064b916dea2d4dcaf04387af7
64b916dea2d4dcaf04387af7- 1Asstfalse
- 2Snap Assisttrue
- 3Screen Assistfalse
- 4Pint Screen Assistfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Snap Assist"
Explanation :
1. The snapping option of Windows 10 allows us to move up to four windows on one screen.
2. To use snapping, you simply need to drag a window to any edge or corner of the screen.
Q: What is the extension of the file in Powerpoint 2010?
1003 064ba3ebbe2108a7239385ad2
64ba3ebbe2108a7239385ad2- 1. Pptfalse
- 2. Ppxfalse
- 3. Pptxtrue
- 4. Ppxtfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. ". Pptx"
Explanation :
1. The file extension in PowerPoint 2010 is .pptx.
2. It is an open XML (Open XML) format used in PowerPoint 2007 and later versions.
3. .pptx files can also be opened with other presentation software, such as OpenOffice Impress, Google Slides, and Apple Keynote.
Q: What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?
1001 063ecd35b0fa4111f87e15cb8
63ecd35b0fa4111f87e15cb8- 1Computer virusfalse
- 2Phishing Scamstrue
- 3Spyware Scamsfalse
- 4None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Phishing Scams"
Explanation :
The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.
Q: Select the smallest memory parity:
1000 064a5120daa4c004ce31be72c
64a5120daa4c004ce31be72c- 1Terabytefalse
- 2Gigabytefalse
- 3Kilobytetrue
- 4Megabytefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Kilobyte"
Explanation :
1. The smallest memory is the parity bit. A bit is a binary digit, which can be either 0 or 1. A bit is the smallest unit of data that a computer can store.
2. A byte is a large unit of memory made up of 8 bits. A byte can be used to store a letter, a number or a symbol.
3. Kilobyte is another large unit of memory which is made up of 1024 bytes. One kilobyte can be used to store a small file.
4. A megabyte is another large unit of memory which is made up of 1024 kilobytes. One megabyte can be used to store a large file.
5. Gigabyte is another large unit of memory which is made up of 1024 megabytes. One gigabyte is equal to the amount of memory used in a medium-sized computer.
5. Terabyte is another large unit of memory which is made up of 1024 gigabytes. One terabyte is equivalent to the amount of memory used in a large computer.
Q: Microprocessor as a switching device is for which generation of computers?
998 063e4d31034b94188517b9528
63e4d31034b94188517b9528- 1first generationfalse
- 2second generationfalse
- 3third generationfalse
- 4fourth generationtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "fourth generation"
Q: Which of the following is an example of a mobile operating system?
997 064a50e4065d2524cbf0b556d
64a50e4065d2524cbf0b556d- 1Keyboardfalse
- 2Chromefalse
- 3Androidtrue
- 4Modemfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Android"
Explanation :
1. Android OS is a mobile operating system based on a modified version of the Linux kernel.
2. It is an open-source software, primarily designed for touchscreen mobile devices like smartphones and tablets.
3. It is a GUI-based OS. Q: The company has a large network which is divided into smaller parts. By using which device LAN can be divided into different parts?
997 063e62de99353301b5ccd84f8
63e62de99353301b5ccd84f8- 1an internal firewallfalse
- 2router between subnetsfalse
- 3individual switch for departmentfalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice

