Computer Knowledge Practice Question and Answer
8 Q: Which of the following devices is used to connect a computer to the internet through a phone line?
994 064943a044e0960e054768279
64943a044e0960e054768279- 1Modemtrue
- 2Routerfalse
- 3Switchfalse
- 4Firewallfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Modem"
Explanation :
1. A modem is used to connect the computer to the Internet through a phone line.
2. A modem converts digital information from your computer into analog signals that can be transmitted over wires (and vice versa).
Q: ______ is used to transmit network data?
993 064ba7665e2108a7239398369
64ba7665e2108a7239398369- 1Microwavefalse
- 2Infraredfalse
- 3Radio Channelfalse
- 4All of the Abovetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of the Above"
Explanation :
The following devices are used to transmit network data.
- Microwave (Microweb)
- Infrared
- Radio Channel
Q: What type of intelligence is given to the computer?
993 06138946f2421ea1e0c83441c
6138946f2421ea1e0c83441c- 1Humanfalse
- 2artificialtrue
- 3purefalse
- 4Othersfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "artificial"
Q: In the context of computing, a byte is equal to bits.
992 0609391366481f36316ea3e92
609391366481f36316ea3e92- 14false
- 224false
- 38true
- 416false
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 3. "8"
Q: C.I.E.T. What is the full form of the following?
991 063a9947fe541fa7a01197b08
63a9947fe541fa7a01197b08- 1Central Institute of Educational Technologytrue
- 2Central Institute of Educational Broadcastingfalse
- 3Samagra Institute of Educational Technologyfalse
- 4Institute of General Educational Technologyfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Central Institute of Educational Technology"
Q: Reverts the changes made by the undo command back to the previous state?
990 061cde4f7edcf9307082f0b7a
61cde4f7edcf9307082f0b7a- 1Undo commandfalse
- 2redo commandtrue
- 3Both A and Bfalse
- 4Shiftfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "redo command"
Q: All of the following are examples of real security and privacy risk except _____.
989 061b8b28ea9d1da035de4f2e8
61b8b28ea9d1da035de4f2e8- 1Hackersfalse
- 2Spamfalse
- 3Virusfalse
- 4Identity Theftfalse
- 5None of thesetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 5. "None of these"
Q: Which type of memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU?
986 060a4f83c63194a66f2d0855f
60a4f83c63194a66f2d0855f- 1Cache memorytrue
- 2Flash memoryfalse
- 3RAMfalse
- 4ROMfalse
- 5PROMfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice

