Computer GK Practice Question and Answer

Q:

_______ is used to measure the speed of the processor.

889 0

  • 1
    Velocity
    Correct
    Wrong
  • 2
    Unit
    Correct
    Wrong
  • 3
    Clock speed
    Correct
    Wrong
  • 4
    Memory
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Clock speed"
Explanation :

1. Clock speed is used to measure the speed of the processor.

2. Clock speed is the rate at which a processor can complete a processing cycle. It is usually measured in megahertz or gigahertz.

3. One megahertz is equal to one million cycles per second, while one gigahertz is equal to one billion cycles per second. This means that a 1.8 GHz processor has twice the clock speed of a 900 MHz processor.

Q:

What is the purpose of an e-public distribution system?

885 0

  • 1
    Providing food grains to the poor at low rates
    Correct
    Wrong
  • 2
    Providing houses to the poor
    Correct
    Wrong
  • 3
    Providing medical facilities to the poor
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Providing food grains to the poor at low rates"
Explanation :

1. In India, an e-Public Distribution System or e-Public Distribution System (ePDS) has been developed to deal with food shortage and through this, food grains are distributed to the poor people of the society at affordable prices.

2. The Centre's allocation of grains to the states depends on the availability of grains in the central stocks and the average grain purchased by the states in the last three years.

3. The main commodities available under this benefit are – wheat, rice, sugar and kerosene.

Q:

What is spam in e-mail?

880 0

  • 1
    Also known as junk mail or unsolicited bulk e-mail, is a subset of electronic spam involving nearly identical messages sent to many recipients by e-mail.
    Correct
    Wrong
  • 2
    It is where outgoing e-mails are stored temporarily.
    Correct
    Wrong
  • 3
    This is where incoming e-mails are stored for your reference.
    Correct
    Wrong
  • 4
    none of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Also known as junk mail or unsolicited bulk e-mail, is a subset of electronic spam involving nearly identical messages sent to many recipients by e-mail."
Explanation :

1. Also known as junk mail or unsolicited bulk email, is a subset of electronic spam involving nearly identical messages sent to multiple recipients by e-mail.

Q:

The Best way to protect your hard drive data Select:

879 0

  • 1
    Scanning
    Correct
    Wrong
  • 2
    Backup
    Correct
    Wrong
  • 3
    Defragmentation
    Correct
    Wrong
  • 4
    Remove junk
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Backup"
Explanation :

The best way to protect your hard drive data is a multi-tiered approach that includes the following:-

1. Data Backup: This is the most important security measure. If your hard drive fails, is stolen, or the data becomes corrupted, you must have a way to restore the data. Data backups should be maintained regularly and in a safe location.

2. Password Protection: Password protects your hard drive. This will help prevent unauthorized access. Use strong passwords that are easy to remember, but difficult to guess.

3. Encryption: Encrypt your hard drive. This will make the data unreadable to people who do not know the password. Encryption provides an additional security layer that keeps data safe in the event of theft or loss.

4. Virus and malware protection: Install a reliable antivirus and antimalware program on your computer. This will help protect your data from harmful software.

5. Secure file sharing: If you plan to share your data with others, make sure you do so in a secure manner. Use a secure file-sharing service that offers encryption and password protection.

Q:

When the computer is booting, the BIOS is loaded into memory by?

877 0

  • 1
    RAM
    Correct
    Wrong
  • 2
    Rome
    Correct
    Wrong
  • 3
    CD-ROM
    Correct
    Wrong
  • 4
    TCP
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Rome"
Explanation :

1. When the computer is booting, the BIOS is loaded from the ROM memory.

2. ROM is the abbreviation of Read Only Memory. It is a chip that contains data inserted by the manufacturer that is rarely removed or modified.

3. It houses the BIOS.

4. ROM is a read-only memory.

5. ROM is non-volatile memory.

Q:

To delete a sentence from a document, you would use the following?

877 0

  • 1
    Highlight and copy
    Correct
    Wrong
  • 2
    Cut and paste
    Correct
    Wrong
  • 3
    Copy and paste
    Correct
    Wrong
  • 4
    Highlight and delete
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Highlight and delete"
Explanation :

To delete a sentence from a document, you would use highlight and delete.

Q:

The main work done by computer is _____

877 0

  • 1
    Arithmetic Operation
    Correct
    Wrong
  • 2
    Logical Operation
    Correct
    Wrong
  • 3
    Storage and Relative
    Correct
    Wrong
  • 4
    all of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "all of the above"

Q:

What is the use of a Mobile Wallet?

877 0

  • 1
    Dialling numbers and watching videos
    Correct
    Wrong
  • 2
    Calling
    Correct
    Wrong
  • 3
    Exchange of money
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Exchange of money"
Explanation :

The mobile wallet can be used for the following functions:

1. Payment: Using a mobile wallet, you can make payments both online and offline. You can pay using your mobile wallet at any store, restaurant, or other business that accepts mobile wallets.

2. Money Transfer: Using a mobile wallet, you can transfer funds from your bank account to another person's bank account. You can send money to your friends, family, or any other person using a mobile wallet.

3. Recharge and bill payments: Using a mobile wallet, you can pay your mobile phone, data pack, electricity bill, water bill, and other bills.

4. Point of Sale (POS) Transactions: Using mobile wallets, you can make payments through POS machines. For POS transactions, you simply need to open your mobile wallet app and tap your phone on the POS machine to make a payment.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully