Computer Knowledge Practice Question and Answer

Q:

The full form of CPC is –

985 0

  • 1
    Cost pay for customer
    Correct
    Wrong
  • 2
    Cost per click
    Correct
    Wrong
  • 3
    Charge per click
    Correct
    Wrong
  • 4
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Cost per click "

Q:

In Word, when you indent a paragraph, you:

984 0

  • 1
    Moves the text up one line.
    Correct
    Wrong
  • 2
    Change the margin on the page.
    Correct
    Wrong
  • 3
    Advances the text with respect to the margin.
    Correct
    Wrong
  • 4
    Moves the text down one line.
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Advances the text with respect to the margin."
Explanation :

1. In Word, when you indent a paragraph, you move the text relative to the margin.

2. Move all or some characters of the paragraph to a certain distance from the left or right margin.

Q:

Which of the following is a data warehouse?

984 0

  • 1
    It can be updated by the end user.
    Correct
    Wrong
  • 2
    There are many naming conventions and formats in it.
    Correct
    Wrong
  • 3
    Organize around important subject areas.
    Correct
    Wrong
  • 4
    They contain only current data.
    Correct
    Wrong
  • 5
    None of these
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Organize around important subject areas."

Q:

________ is word processor software with basic formatting options and is included in all versions of the OS since Windows 95.

983 0

  • 1
    Wordpad
    Correct
    Wrong
  • 2
    Microsoft Paint
    Correct
    Wrong
  • 3
    Quickheel
    Correct
    Wrong
  • 4
    Oracle
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Wordpad"
Explanation :

1. WordPad is word processor software with basic formatting options and is included in all versions of the OS since Windows 95.

Q:

What is BCC Option in E-mail?

982 0

  • 1
    Blind Carbon Copy
    Correct
    Wrong
  • 2
    Best Carbon Copy
    Correct
    Wrong
  • 3
    Blink copy creation
    Correct
    Wrong
  • 4
    none of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Blind Carbon Copy"

Q:

Which of the following is responsible for locating the domain name and translating it into Internet Protocol (IP) protocol?

981 0

  • 1
    HTTP
    Correct
    Wrong
  • 2
    HTTPS
    Correct
    Wrong
  • 3
    DNM
    Correct
    Wrong
  • 4
    URL
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "HTTP"
Explanation :

1. HTTP is responsible for locating the domain name and translating it into Internet Protocol S.

2. IP address (Internet Protocol address) is a digital address used to identify a computer or device on the Internet or any other network.

Q:

What is the complete form of Mooc?

981 0

  • 1
    Master of Online Courses
    Correct
    Wrong
  • 2
    Massive Open Online Courses
    Correct
    Wrong
  • 3
    Massive Operation on Courses
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Massive Open Online Courses"
Explanation :

1. Massive Open Online Courses (MOOC) are changing the world of education by providing free online courses.

2. MOOC is a web-based free distance learning program that ensures the participation of students from geographically remote areas in the field of education.

3. It offers free online courses for higher education, executive education and employee development.

Q:

Which of the following methods is used to secure and protect sensitive data on computer systems?

978 0

  • 1
    encryption
    Correct
    Wrong
  • 2
    Defragmentation
    Correct
    Wrong
  • 3
    Formatting
    Correct
    Wrong
  • 4
    rebooting
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "encryption"
Explanation :

1. Encryption is the process of encoding data in cryptography.

2. This process transforms the plaintext or original representation of data into ciphertext or alternative representation of the data.

3. Only authorized parties should be able to decipher the ciphertext back into plaintext and access the original data.

4. Encryption in itself does not prevent interference, but it hinders interceptors from deciphering the content.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully