Computer GK Practice Question and Answer
8 Q: Can it be kept in a cell of Microsoft Excel?
777 064b9327c23047f4c71ce4b3b
64b9327c23047f4c71ce4b3b- 1Numberfalse
- 2Textfalse
- 3Formulafalse
- 4All of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of the above "
Explanation :
Can be placed in a cell of Microsoft Excel.
- Number
- Text
- Formula
Q: The main work done by computer is _____
772 063e4d2c7124b1363b8ebe120
63e4d2c7124b1363b8ebe120- 1Arithmetic Operationfalse
- 2Logical Operationfalse
- 3Storage and Relativefalse
- 4all of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "all of the above"
Q: Using which keys opens the option of 'Find and Replace'?
769 064b91e54a2d4dcaf043896c3
64b91e54a2d4dcaf043896c3- 1Ctrl + Ftrue
- 2Ctrl + Xfalse
- 3Ctrl + Rfalse
- 4Ctrl + Hfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Ctrl + F"
Explanation :
1. Using Ctrl + F opens the option of ‘Find and Replace’.
2. In Word, the shortcut key Ctrl + F is used to open the Find box.
3. Ctrl + F is used to find a document.
Q: You can access social media from a computer using the following:
769 064a53edeaa4c004ce31c8ca0
64a53edeaa4c004ce31c8ca0- 1Documents, Excel, PPT etc.false
- 2YouTube, Google Play, Outlook etc.false
- 3Facebook, Instagram, Twitter etc.true
- 4SSO, PRSY, One Purefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Facebook, Instagram, Twitter etc."
Explanation :
1. Social media is a technology through which we can share our ideas and information with people.
2. Social media is internet based and it provides instant electronic communication facility to the users. Users connect to social media through a web browser or application from a computer, laptop, tablet or smartphone.
3. Examples of social media –
1. Facebook
2. YouTube
3. Instagram
4. LinkedIn
5. Twitter
6. Whatsapp
7. Pinterest
8. Snapchat
9. Telegram
Q: What is the purpose of an e-public distribution system?
768 064b9180fe154aff53380f0b1
64b9180fe154aff53380f0b1- 1Providing food grains to the poor at low ratestrue
- 2Providing houses to the poorfalse
- 3Providing medical facilities to the poorfalse
- 4All of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Providing food grains to the poor at low rates"
Explanation :
1. In India, an e-Public Distribution System or e-Public Distribution System (ePDS) has been developed to deal with food shortage and through this, food grains are distributed to the poor people of the society at affordable prices.
2. The Centre's allocation of grains to the states depends on the availability of grains in the central stocks and the average grain purchased by the states in the last three years.
3. The main commodities available under this benefit are – wheat, rice, sugar and kerosene.
Q: BHIM app is available in ______ languages.
767 063e9f0dcb4202b4767d25ab7
63e9f0dcb4202b4767d25ab7- 111false
- 212false
- 313true
- 415false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "13"
Q: When the computer is booting, the BIOS is loaded into memory by?
763 064a510a265d2524cbf0b5fef
64a510a265d2524cbf0b5fef- 1RAMfalse
- 2Rometrue
- 3CD-ROMfalse
- 4TCPfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Rome"
Explanation :
1. When the computer is booting, the BIOS is loaded from the ROM memory.
2. ROM is the abbreviation of Read Only Memory. It is a chip that contains data inserted by the manufacturer that is rarely removed or modified.
3. It houses the BIOS.
4. ROM is a read-only memory.
5. ROM is non-volatile memory.
Q: Junk e-mail is called:
763 064a540acb394764d11b18bdf
64a540acb394764d11b18bdf- 1Spamtrue
- 2Spooffalse
- 3Sniffer scriptfalse
- 4Spoolfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Spam"
Explanation :
1. Junk email is called spam. Spam is an email that you did not request, and which usually promotes advertising or other unwanted content.
2. Spoofing is a special type of cyber-attack in which someone attempts to deceive other computer networks by using a computer, device, or network to identify themselves as a legitimate entity.

