Computer GK Practice Question and Answer
8 Q: What is spam in e-mail?
751 06494233f4e0960e054764639
6494233f4e0960e054764639- 1Also known as junk mail or unsolicited bulk e-mail, is a subset of electronic spam involving nearly identical messages sent to many recipients by e-mail.true
- 2It is where outgoing e-mails are stored temporarily.false
- 3This is where incoming e-mails are stored for your reference.false
- 4none of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Also known as junk mail or unsolicited bulk e-mail, is a subset of electronic spam involving nearly identical messages sent to many recipients by e-mail."
Explanation :
1. Also known as junk mail or unsolicited bulk email, is a subset of electronic spam involving nearly identical messages sent to multiple recipients by e-mail.
Q: ______ is a small picture that represents a program, folder or program function and is displayed in the user's user interface when it is double-clicked.
750 064b915b523047f4c71cde258
64b915b523047f4c71cde258- 1Taskbarfalse
- 2Iconstrue
- 3Commandfalse
- 4System trayfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Icons"
Explanation :
1. Icons are small pictures that represent a program, folder, or program function and are displayed in the user's user interface when they are double-clicked.
Q: Which of the following is necessary for filing an Income Tax Return online?
745 064b9222623047f4c71ce0ec5
64b9222623047f4c71ce0ec5- 1Bank statementfalse
- 2Form 16false
- 3Copy of last year's returnfalse
- 4All of the abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of the above "
Explanation :
The following are required to file income tax return online:
PAN Card: It is a mandatory document that authenticates you as identity and address proof for filing income tax returns.
Aadhaar Card: This is an optional document that can be used as identity proof.
Form 16: This is a certificate that shows your income and deductions. Your employer provides you with Form 16.
Bank account details: You will use your bank account to pay your return.
Copy of previous year's return: A copy of the previous year's return is also required.
Internet Connection: You will need an internet connection to file your return on the Income Tax Department website.
Q: What is the use of a Mobile Wallet?
745 064b914b12d3130f5753f077a
64b914b12d3130f5753f077a- 1Dialling numbers and watching videosfalse
- 2Callingfalse
- 3Exchange of moneytrue
- 4None of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Exchange of money"
Explanation :
The mobile wallet can be used for the following functions:
1. Payment: Using a mobile wallet, you can make payments both online and offline. You can pay using your mobile wallet at any store, restaurant, or other business that accepts mobile wallets.
2. Money Transfer: Using a mobile wallet, you can transfer funds from your bank account to another person's bank account. You can send money to your friends, family, or any other person using a mobile wallet.
3. Recharge and bill payments: Using a mobile wallet, you can pay your mobile phone, data pack, electricity bill, water bill, and other bills.
4. Point of Sale (POS) Transactions: Using mobile wallets, you can make payments through POS machines. For POS transactions, you simply need to open your mobile wallet app and tap your phone on the POS machine to make a payment.
Q: To delete a sentence from a document, you would use the following?
743 064a5299965d2524cbf0bb8b7
64a5299965d2524cbf0bb8b7- 1Highlight and copyfalse
- 2Cut and pastefalse
- 3Copy and pastefalse
- 4Highlight and deletetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Highlight and delete"
Explanation :
To delete a sentence from a document, you would use highlight and delete.
Q: The expanded form of BCC used in e-mail communication is:
741 06494124413e8bde03235572c
6494124413e8bde03235572c- 1Blue carbon copyfalse
- 2Blind carbon copytrue
- 3Black carbon copyfalse
- 4Back carbon copyfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Blind carbon copy"
Explanation :
1. Blind carbon copy is the extended form of BCC used in e-mail communication.
2. It is used to send a copy of an email to a person without informing the recipient about it i.e. the identity of the recipient mentioned in the 'Bcc field' is hidden from other recipients receiving the same email.
3. Recipients in the BCC list can see every other email address, including the To and CC lists.
Q: How is the resolution of the screen shown?
741 064a518a1b394764d11b0c155
64a518a1b394764d11b0c155- 1Dotsfalse
- 2Colorsfalse
- 3Pixels per inchtrue
- 4Dot per inchfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "Pixels per inch"
Explanation :
1. PPI (pixels per inch) refers to display resolution, or, how many individual pixels are displayed in one inch of a digital image.
2. DPI (dots per inch) refers to printer resolution, or, the number of dots of ink on a printed image.
3. The physical size of an image refers to the dimensions in which it will print (ex: 8.5" x 11") or the pixel dimensions of an image displayed on the web (ex: 600 pixels x 800 pixels).
Q: Which of these runs on Computer hardware and provides a platform to run other software?
739 064944331cae316dfef72e307
64944331cae316dfef72e307- 1Operating systemtrue
- 2Application softwarefalse
- 3Both (A) and (B)false
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Operating system"
Explanation :
1. The operating system runs on computer hardware and provides the platform to run other software.
2. The computer takes the help of various devices and programs to do its work. There is a separate and special computer program to handle these devices and programs, this special master program is known as the operating system.
3. Operating System, in short form is called OS, is a computer program which operates other computer programs. The operating system acts as an intermediary between users and the computer system. It explains our instructions to the computer. Other software programs and hardware are operated through the operating system.

