Computer Knowledge Practice Question and Answer
8 Q: Android is an example.
1130 061cdddcd8067f406dfea5407
61cdddcd8067f406dfea5407- 1Hardwarefalse
- 2Application softwarefalse
- 3operating systemtrue
- 4Mobile Kernelfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "operating system"
Q: Which one of the following is not an operating system?
1130 064a51284dc607a4d2b27b1ac
64a51284dc607a4d2b27b1ac- 1Unixfalse
- 2DOSfalse
- 3Linuxfalse
- 4HPtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "HP"
Explanation :
1. An operating system is not HP.
2. The full name of HP is Hewlett-Packard. It is an American multinational information technology company that manufactures and sells computer hardware, software, and services.
Q: Which of the following is not an example of an output device?
1130 063e4d50bc386f46a0a6f2863
63e4d50bc386f46a0a6f2863- 1Monitorfalse
- 2printerfalse
- 3Plotterfalse
- 4Keyboardtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Keyboard"
Q: GUI based operating system and CUI based operating system.
1130 061cedf5a7d37a335232b4d4f
61cedf5a7d37a335232b4d4f- 1Windows 7, MS-DOSfalse
- 2MS-DOS, UNIXfalse
- 3Unix, Windows NTfalse
- 4Windows7,Linuxtrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Windows7,Linux"
Q: M.S. Which data types cannot be changed by the user in Access 2010? Choose the most appropriate option.
1130 064ba76fae2108a7239398507
64ba76fae2108a7239398507- 1Auto Textfalse
- 2Date/Timefalse
- 3Auto Numberfalse
- 4All of the Abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. " All of the Above"
Explanation :
In MS Access 2010, data types cannot be entered or changed by the user.
- Auto Text
- Date/Time
- Auto Number
Q: ______ is used to transmit network data?
1128 064ba7665e2108a7239398369
64ba7665e2108a7239398369- 1Microwavefalse
- 2Infraredfalse
- 3Radio Channelfalse
- 4All of the Abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of the Above"
Explanation :
The following devices are used to transmit network data.
- Microwave (Microweb)
- Infrared
- Radio Channel
Q: Which of the following devices is used to connect a computer to the internet through a phone line?
1127 064943a044e0960e054768279
64943a044e0960e054768279- 1Modemtrue
- 2Routerfalse
- 3Switchfalse
- 4Firewallfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Modem"
Explanation :
1. A modem is used to connect the computer to the Internet through a phone line.
2. A modem converts digital information from your computer into analog signals that can be transmitted over wires (and vice versa).
Q: Which of the following is not a type of Cyber Threat?
1126 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

