Computer GK Practice Question and Answer

Q:

_______ is used to measure the speed of the processor.

828 0

  • 1
    Velocity
    Correct
    Wrong
  • 2
    Unit
    Correct
    Wrong
  • 3
    Clock speed
    Correct
    Wrong
  • 4
    Memory
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Clock speed"
Explanation :

1. Clock speed is used to measure the speed of the processor.

2. Clock speed is the rate at which a processor can complete a processing cycle. It is usually measured in megahertz or gigahertz.

3. One megahertz is equal to one million cycles per second, while one gigahertz is equal to one billion cycles per second. This means that a 1.8 GHz processor has twice the clock speed of a 900 MHz processor.

Q:

Internet Explorer has been replaced by _______ web browser in Windows 10.

827 0

  • 1
    Windows Store
    Correct
    Wrong
  • 2
    Microsoft Edge
    Correct
    Wrong
  • 3
    Google Chrome
    Correct
    Wrong
  • 4
    Microsoft Chrome
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Microsoft Edge"
Explanation :

1. Internet Explorer in Windows 10 has been replaced by the Microsoft Edge web browser.

2. More secure, faster and more convenient than Internet Explorer.

Microsoft Edge has many security features, such as Threaded Modeling and Analysis (TPM) support, multi-fingerprint authentication, and firewall.

3. Microsoft Edge is faster than Internet Explorer.

Q:

BHIM app is available in ______ languages.

826 0

  • 1
    11
    Correct
    Wrong
  • 2
    12
    Correct
    Wrong
  • 3
    13
    Correct
    Wrong
  • 4
    15
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "13"

Q:

Which option is used for formatting the contents of a cell in Ms-excel?

825 0

  • 1
    Clipboard group notap
    Correct
    Wrong
  • 2
    Font group
    Correct
    Wrong
  • 3
    Alignment group
    Correct
    Wrong
  • 4
    Text
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Text"
Explanation :

1. In MS Excel, the text option is used for formatting the cell's content.

2. Under the formatting of text, alignment of the font in the cell, style of font, the colour of font, bold, italics, underline, fill colour, border colour, the format of numbers, format of date, format of decimal digits, wrap text ( Wrapping text), Shrink to fit, Orientation (vertically and horizontally), etc.

3. Use the following steps for formatting the text-

1. Select the cells or range that need to be formatted.

2. Select the Cell option from the Format menu on the menu bar.

3. You will get different tabs for different formats.

4. Click on the Font tab and do the formatting as required.

5. Finally click on the OK button.

Q:

 ______ is a small picture that represents a program, folder or program function and is displayed in the user's user interface when it is double-clicked.

821 0

  • 1
    Taskbar
    Correct
    Wrong
  • 2
    Icons
    Correct
    Wrong
  • 3
    Command
    Correct
    Wrong
  • 4
    System tray
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Icons"
Explanation :

1. Icons are small pictures that represent a program, folder, or program function and are displayed in the user's user interface when they are double-clicked.

Q:

The Best way to protect your hard drive data Select:

820 0

  • 1
    Scanning
    Correct
    Wrong
  • 2
    Backup
    Correct
    Wrong
  • 3
    Defragmentation
    Correct
    Wrong
  • 4
    Remove junk
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Backup"
Explanation :

The best way to protect your hard drive data is a multi-tiered approach that includes the following:-

1. Data Backup: This is the most important security measure. If your hard drive fails, is stolen, or the data becomes corrupted, you must have a way to restore the data. Data backups should be maintained regularly and in a safe location.

2. Password Protection: Password protects your hard drive. This will help prevent unauthorized access. Use strong passwords that are easy to remember, but difficult to guess.

3. Encryption: Encrypt your hard drive. This will make the data unreadable to people who do not know the password. Encryption provides an additional security layer that keeps data safe in the event of theft or loss.

4. Virus and malware protection: Install a reliable antivirus and antimalware program on your computer. This will help protect your data from harmful software.

5. Secure file sharing: If you plan to share your data with others, make sure you do so in a secure manner. Use a secure file-sharing service that offers encryption and password protection.

Q:

Junk e-mail is called:

820 0

  • 1
    Spam
    Correct
    Wrong
  • 2
    Spoof
    Correct
    Wrong
  • 3
    Sniffer script
    Correct
    Wrong
  • 4
    Spool
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Spam"
Explanation :

1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.

2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.

Q:

The main work done by computer is _____

817 0

  • 1
    Arithmetic Operation
    Correct
    Wrong
  • 2
    Logical Operation
    Correct
    Wrong
  • 3
    Storage and Relative
    Correct
    Wrong
  • 4
    all of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "all of the above"

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully