Practice Question and Answer

Q:

Mariana Trench is found in

2359 0

  • 1
    Atlantic Ocean
    Correct
    Wrong
  • 2
    Pacific Ocean
    Correct
    Wrong
  • 3
    Indian Ocean
    Correct
    Wrong
  • 4
    Arctic Ocean
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Pacific Ocean "
Explanation :

The Mariana Trench, in the Pacific Ocean, is the deepest location on Earth. According to the Exclusive Economic Zone (EEZ), the United States has jurisdiction over the trench and its resources. Scientists use a variety of technologies to overcome the challenges of deep-sea exploration and explore the Trench.


Q:

In which country is the headquarters of the World Bank located?

1789 0

  • 1
    England
    Correct
    Wrong
  • 2
    Russia
    Correct
    Wrong
  • 3
    USA
    Correct
    Wrong
  • 4
    Japan
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "USA"
Explanation :

The headquarters of the World Bank is in Washington D.C. United States of America (USA).

Q:

The amount of ordinary salt present in ocean water is-

3548 0

  • 1
    3.5%
    Correct
    Wrong
  • 2
    10%
    Correct
    Wrong
  • 3
    5%
    Correct
    Wrong
  • 4
    12.8%
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. " 3.5%"
Explanation :

The concentration of salt in seawater (its salinity) is about 35 parts per thousand; in other words, about 3.5% of the weight of seawater comes from the dissolved salts.

Q:

Which place is said to be the Manchester of South India?

3929 0

  • 1
    Coimbatore
    Correct
    Wrong
  • 2
    Salem
    Correct
    Wrong
  • 3
    Thanjavur
    Correct
    Wrong
  • 4
    Madurai
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Coimbatore"
Explanation :

Coimbatore is called the 'Manchester of South India'. The city is located in the state of Tamil Nadu. The city has a major production and economy in the textile industry. The textile industry gives the major production which is surrounded by the cotton fields in neighbouring villages.

Q:

According to the IT Act, which of the following section prohibits the publication of obscene material?

1064 0

  • 1
    Section 65
    Correct
    Wrong
  • 2
    Section 67
    Correct
    Wrong
  • 3
    Section 66
    Correct
    Wrong
  • 4
    Section 43
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Section 67"
Explanation :

1. According to the IT Act, Section 67 prevents the publication of obscene material.

2. Under Section 67 of the IT Act, if any objectionable video of any kind is posted on the internet, there is a provision to take action against the person.

Q:

What is a drone?

1126 0

  • 1
    An unmanned aerial vehicle
    Correct
    Wrong
  • 2
    Wi-Fi technology
    Correct
    Wrong
  • 3
    Web browser
    Correct
    Wrong
  • 4
    Wireless charger
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "An unmanned aerial vehicle"
Explanation :

1. In technical language, the drone is an unmanned aircraft. These drones are formally known as Unmanned Aerial Vehicles (UAVs) or Unmanned Aircraft Systems (UASs). Drones are flying robots that are controlled via remote or fly automatically through software-controlled flight plans, which are embedded systems that work with the help of sensors and GPS.

Q:

Joystick is a type of ______?

1117 0

  • 1
    Input device
    Correct
    Wrong
  • 2
    memory
    Correct
    Wrong
  • 3
    Output device
    Correct
    Wrong
  • 4
    Game
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Input device"
Explanation :

1. The input device is the device that provides data and control signals to the computer.

2. Major examples of input devices -

- Keyboard, Mouse, Scanner, Joystick, Microphone, Magnetic Ink Character Recognition (MICR), Optical Character Reader (OCR), Touchpad, Touch Screen, Webcam.

Q:

Which of the following is not a type of Cyber Threat?

996 0

  • 1
    Hunting
    Correct
    Wrong
  • 2
    Fishing
    Correct
    Wrong
  • 3
    Spy
    Correct
    Wrong
  • 4
    Hacking
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Hunting"
Explanation :

There are many types of cyber threats, including:

1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.

2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.

3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.

4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.

5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.

6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.

7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.

8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.

9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully