Computer Knowledge Practice Question and Answer
8 Q: Which among the following is the latest version of Microsoft Windows?
976 060b88fb2aea2402e59c20070
60b88fb2aea2402e59c20070- 1Microsoft Office 365false
- 2Windows 9.1false
- 3Windows 8.1false
- 4Windows 10true
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "Windows 10"
Q: Which of the following are valid search engines?
975 061cede368067f406dfece0f2
61cede368067f406dfece0f2- 1Twitter, Facebook, Google Plusfalse
- 2Google, Bing, Yahootrue
- 3Web Spider, Indexing, Decision Enginefalse
- 4none of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "Google, Bing, Yahoo"
Q: Which of the following is not a type of Cyber Threat?
975 064ba3f3c88d5e4f52de3063e
64ba3f3c88d5e4f52de3063e- 1Huntingtrue
- 2Fishingfalse
- 3Spyfalse
- 4Hackingfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Hunting"
Explanation :
There are many types of cyber threats, including:
1. Spam Email: Spam email is a type of cyber threat which is done by sending unsolicited emails. Spam emails are often used to spread advertisements, scams, or viruses.
2. Hacking: Hacking is a type of cyber threat that involves gaining unauthorized access to a computer system or network. Hackers often use hacking to steal data, damage systems, or intercept transactions.
3. Phishing: Phishing is a type of cyber threat in which victims are tricked into providing their personal information, such as passwords or credit card numbers. Phishing attacks are often carried out via email, social media, or websites.
4. Viruses: Viruses are a type of malware that can infect a computer system and damage data, slow down the system, or even disable it. Viruses often spread through spam emails, infected files, or physical media.
5. Worm: A worm is a type of malware that can copy itself from a computer system and spread from one system to another. Worms often spread via email, infected files, or physical media.
6. Denial-of-Service (DoS) attacks: DoS attacks are a type of cyber threat that is used to disable a website or service. DoS attacks are often carried out using large amounts of traffic or resources.
7. Load Ballast Attacks: Load ballast attacks are a type of DoS attack in which a large amount of data is sent to a website or service. Load ballast attacks are often carried out to disable a website or service.
8. Human-based attacks: Human-based attacks are a type of cyberattack that target people. Human-based attacks can include phishing, social engineering, and cyberpsychology.
9. Physical Attacks: Physical attacks are a type of cyberattack that targets the physical components of a computer system or network. Physical attacks could include data centre fires or power outages.
Q: Why is clrscer() used?
974 063e62bb3e6cd351b75eca59e
63e62bb3e6cd351b75eca59e- 1to erasefalse
- 2to clear the message from the screentrue
- 3to storefalse
- 4for all of the abovefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 2. "to clear the message from the screen"
Explanation :
The clrscr in C is a built-in function that is used for clearing the screen of the console output during the execution of the C program. This function is defined in the conio. h header file. We need to include the “conio.
Q: The place in a computer, where the OS, application programs and data in current use are kept so that they can be quickly reached by the computer processor, it is called _________?
974 060a4e5f6f98a5977251a0fc0
60a4e5f6f98a5977251a0fc0- 1TRASHfalse
- 2Access control listfalse
- 3ROMfalse
- 4RAMtrue
- 5None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "RAM "
Q: What does the comment give for a cell entry to show on the screen?
974 064b9196c2dc867f59303bf27
64b9196c2dc867f59303bf27- 1Commenttrue
- 2Indicatorfalse
- 3Picturefalse
- 4None of thesefalse
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 1. "Comment"
Explanation :
The comment given for a cell entry displays the following information on the screen:
1. Comment text: The comment text is written by the person who is rating the item. This text may express the person's opinion or reaction to CellEntry.
2. Comment Rating: Comment rating is a numerical value that reflects the quality of the cell entry. Ratings usually range from 1 to 5, where 1 is the lowest and 5 is the highest.
3. Comment time: Comment time is the time when the comment was written.
Q: Which of the following is a special key ?
972 060a21bb63c86b05632612abe
60a21bb63c86b05632612abe- 1Ctrlfalse
- 2Escfalse
- 3Insertfalse
- 4All of thesetrue
- Show AnswerHide Answer
- Workspace
- SingleChoice
Answer : 4. "All of these"
Q: An example of an analog computer is-
972 063bff44f1b93047bc21839d2
63bff44f1b93047bc21839d2- 1desktopfalse
- 2laptopfalse
- 3Speedometertrue
- 4Tabletfalse
- Show AnswerHide Answer
- Workspace
- SingleChoice

