Computer Knowledge Practice Question and Answer

Q:

Android is an example.

1130 0

  • 1
    Hardware
    Correct
    Wrong
  • 2
    Application software
    Correct
    Wrong
  • 3
    operating system
    Correct
    Wrong
  • 4
    Mobile Kernel
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "operating system"

Q:

Which one of the following is not an operating system?

1130 0

  • 1
    Unix
    Correct
    Wrong
  • 2
    DOS
    Correct
    Wrong
  • 3
    Linux
    Correct
    Wrong
  • 4
    HP
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "HP"
Explanation :

1. An operating system is not HP.

2. The full name of HP is Hewlett-Packard. It is an American multinational information technology company that manufactures and sells computer hardware, software, and services.

Q:

Which of the following is not an example of an output device?

1130 0

  • 1
    Monitor
    Correct
    Wrong
  • 2
    printer
    Correct
    Wrong
  • 3
    Plotter
    Correct
    Wrong
  • 4
    Keyboard
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Keyboard"

Q:

GUI based operating system and CUI based operating system.

1130 0

  • 1
    Windows 7, MS-DOS
    Correct
    Wrong
  • 2
    MS-DOS, UNIX
    Correct
    Wrong
  • 3
    Unix, Windows NT
    Correct
    Wrong
  • 4
    Windows7,Linux
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Windows7,Linux"

Q:

M.S. Which data types cannot be changed by the user in Access 2010? Choose the most appropriate option.

1130 0

  • 1
    Auto Text
    Correct
    Wrong
  • 2
    Date/Time
    Correct
    Wrong
  • 3
    Auto Number
    Correct
    Wrong
  • 4
    All of the Above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. " All of the Above"
Explanation :

In MS Access 2010, data types cannot be entered or changed by the user.

- Auto Text

- Date/Time

- Auto Number

Q:

______ is used to transmit network data?

1128 0

  • 1
    Microwave
    Correct
    Wrong
  • 2
    Infrared
    Correct
    Wrong
  • 3
    Radio Channel
    Correct
    Wrong
  • 4
    All of the Above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "All of the Above"
Explanation :

The following devices are used to transmit network data.

- Microwave (Microweb)

- Infrared

- Radio Channel

Q:

Which of the following devices is used to connect a computer to the internet through a phone line?

1127 0

  • 1
    Modem
    Correct
    Wrong
  • 2
    Router
    Correct
    Wrong
  • 3
    Switch
    Correct
    Wrong
  • 4
    Firewall
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Modem"
Explanation :

1. A modem is used to connect the computer to the Internet through a phone line.

2. A modem converts digital information from your computer into analog signals that can be transmitted over wires (and vice versa).

Q:

Which of the following is not a type of Cyber Threat?

1126 0

  • 1
    Hunting
    Correct
    Wrong
  • 2
    Fishing
    Correct
    Wrong
  • 3
    Spy
    Correct
    Wrong
  • 4
    Hacking
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 1. "Hunting"
Explanation :

There are many types of cyber threats, including:

1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.

2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.

3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.

4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.

5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.

6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.

7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.

8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.

9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully