Practice Question and Answer
8 Q: Mariana Trench is found in
2359 05dc10b408e9a3a0f0dd7133a
5dc10b408e9a3a0f0dd7133a- 1Atlantic Oceanfalse
- 2Pacific Oceantrue
- 3Indian Oceanfalse
- 4Arctic Oceanfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Pacific Ocean "
Explanation :
The Mariana Trench, in the Pacific Ocean, is the deepest location on Earth. According to the Exclusive Economic Zone (EEZ), the United States has jurisdiction over the trench and its resources. Scientists use a variety of technologies to overcome the challenges of deep-sea exploration and explore the Trench.
Q: In which country is the headquarters of the World Bank located?
1789 05db29608dda2a44b4cb5bfff
5db29608dda2a44b4cb5bfff- 1Englandfalse
- 2Russiafalse
- 3USAtrue
- 4Japanfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "USA"
Explanation :
The headquarters of the World Bank is in Washington D.C. United States of America (USA).
Q: The amount of ordinary salt present in ocean water is-
3548 05dad4a816574ed4ea4147104
5dad4a816574ed4ea4147104- 13.5%true
- 210%false
- 35%false
- 412.8%false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. " 3.5%"
Explanation :
The concentration of salt in seawater (its salinity) is about 35 parts per thousand; in other words, about 3.5% of the weight of seawater comes from the dissolved salts.
Q: Which place is said to be the Manchester of South India?
3929 05d7b710d268c0f29d5908f2d
5d7b710d268c0f29d5908f2d- 1Coimbatoretrue
- 2Salemfalse
- 3Thanjavurfalse
- 4Maduraifalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Coimbatore"
Explanation :
Coimbatore is called the 'Manchester of South India'. The city is located in the state of Tamil Nadu. The city has a major production and economy in the textile industry. The textile industry gives the major production which is surrounded by the cotton fields in neighbouring villages.
Q: According to the IT Act, which of the following section prohibits the publication of obscene material?
1064 064ba4043c3da05b2213df49b
64ba4043c3da05b2213df49b- 1Section 65false
- 2Section 67true
- 3Section 66false
- 4Section 43false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Section 67"
Explanation :
1. According to the IT Act, Section 67 prevents the publication of obscene material.
2. Under Section 67 of the IT Act, if any objectionable video of any kind is posted on the internet, there is a provision to take action against the person.
Q: What is a drone?
1126 064ba607f2dc867f593074918
64ba607f2dc867f593074918- 1An unmanned aerial vehicletrue
- 2Wi-Fi technologyfalse
- 3Web browserfalse
- 4Wireless chargerfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "An unmanned aerial vehicle"
Explanation :
1. In technical language, the drone is an unmanned aircraft. These drones are formally known as Unmanned Aerial Vehicles (UAVs) or Unmanned Aircraft Systems (UASs). Drones are flying robots that are controlled via remote or fly automatically through software-controlled flight plans, which are embedded systems that work with the help of sensors and GPS.
Q: Joystick is a type of ______?
1117 064ba4ef888d5e4f52de341d9
64ba4ef888d5e4f52de341d9- 1Input devicetrue
- 2memoryfalse
- 3Output devicefalse
- 4Gamefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Input device"
Explanation :
1. The input device is the device that provides data and control signals to the computer.
2. Major examples of input devices -
- Keyboard, Mouse, Scanner, Joystick, Microphone, Magnetic Ink Character Recognition (MICR), Optical Character Reader (OCR), Touchpad, Touch Screen, Webcam.
Q: Which of the following is not a type of Cyber Threat?
996 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

