Computer GK Practice Question and Answer
8 Q: How many bits are there in a byte?
573 063e9feba7407bd1b2d271b22
63e9feba7407bd1b2d271b22- 12false
- 24false
- 38true
- 416false
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "8"
Q: Which application software enables you to create efficient slide show presentation stations?
573 064a52f668ecb104cc6258593
64a52f668ecb104cc6258593- 1MS Excelfalse
- 2MS Outlookfalse
- 3MS PowerPointtrue
- 4MS Paintfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "MS PowerPoint"
Explanation :
1. Microsoft PowerPoint: This is the most popular slide show presentation software. It is easy to use and has many features that allow you to create engaging and informative slideshows.
2. Google Slides: It is a free online slideshow presentation software. It offers similar features to PowerPoint and can be used in any web browser.
3. LibreOffice Presentation: It is a free and open-source slideshow presentation software. It offers features similar to PowerPoint and Slides.
4. Adobe Presentation: It is a professional slide show presentation software. It has more advanced features than PowerPoint and Slides.
Q: The radix of the hexadecimal number system is –
572 063ea00f47312b71d33d7ee23
63ea00f47312b71d33d7ee23- 16false
- 28false
- 316true
- 410false
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "16"
Q: The Best way to protect your hard drive data Select:
571 064a51756dc607a4d2b27c13f
64a51756dc607a4d2b27c13f- 1Scanningfalse
- 2Backuptrue
- 3Defragmentationfalse
- 4Remove junkfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "Backup"
Explanation :
The best way to protect your hard drive data is a multi-tiered approach that includes the following:-
1. Data Backup: This is the most important security measure. If your hard drive fails, is stolen, or the data becomes corrupted, you must have a way to restore the data. Data backups should be maintained regularly and in a safe location.
2. Password Protection: Password protects your hard drive. This will help prevent unauthorized access. Use strong passwords that are easy to remember, but difficult to guess.
3. Encryption: Encrypt your hard drive. This will make the data unreadable to people who do not know the password. Encryption provides an additional security layer that keeps data safe in the event of theft or loss.
4. Virus and malware protection: Install a reliable antivirus and antimalware program on your computer. This will help protect your data from harmful software.
5. Secure file sharing: If you plan to share your data with others, make sure you do so in a secure manner. Use a secure file-sharing service that offers encryption and password protection.
Q: What is the number of bits in a nibble?
568 063e9ffda3c221e1b4dc724d9
63e9ffda3c221e1b4dc724d9- 12false
- 24true
- 36false
- 48false
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "4"
Q: _______ is used to measure the speed of the processor.
568 064a52879dc607a4d2b28119b
64a52879dc607a4d2b28119b- 1Velocityfalse
- 2Unitfalse
- 3Clock speedtrue
- 4Memoryfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 3. "Clock speed"
Explanation :
1. Clock speed is used to measure the speed of the processor.
2. Clock speed is the rate at which a processor can complete a processing cycle. It is usually measured in megahertz or gigahertz.
3. One megahertz is equal to one million cycles per second, while one gigahertz is equal to one billion cycles per second. This means that a 1.8 GHz processor has twice the clock speed of a 900 MHz processor.
Q: Which of the following is an example of an input device?
562 06493fd9fcae316dfef71c673
6493fd9fcae316dfef71c673- 1Printerfalse
- 2scannertrue
- 3speakerfalse
- 4Monitorfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 2. "scanner"
Explanation :
1. The input device is the device that provides data and control signals to the computer.
2. Major examples of input devices -
- Keyboard, Mouse, Scanner, Joystick, Microphone, Magnetic Ink Character Recognition (MICR), Optical Character Reader (OCR), Touchpad, Touch Screen, Webcam.
Q: Using which keys opens the option of 'Find and Replace'?
559 064b91e54a2d4dcaf043896c3
64b91e54a2d4dcaf043896c3- 1Ctrl + Ftrue
- 2Ctrl + Xfalse
- 3Ctrl + Rfalse
- 4Ctrl + Hfalse
- Show Answer
- Workspace
- SingleChoice
Answer : 1. "Ctrl + F"
Explanation :
1. Using Ctrl + F opens the option of ‘Find and Replace’.
2. In Word, the shortcut key Ctrl + F is used to open the Find box.
3. Ctrl + F is used to find a document.