Computer Knowledge Practice Question and Answer

Q:

Through _______ can you link any location of the current document to another document or website?

931 0

  • 1
    Link
    Correct
    Wrong
  • 2
    Hyperlink
    Correct
    Wrong
  • 3
    Database
    Correct
    Wrong
  • 4
    Form
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Hyperlink"
Explanation :

1. Through hyper link you can connect any location of the current document to another document or website.

2. Hypers are found in almost all web pages. Links allow users to click from one page to another.

Q:

What is the extension of the file in Powerpoint 2010?

931 0

  • 1
    . Ppt
    Correct
    Wrong
  • 2
    . Ppx
    Correct
    Wrong
  • 3
    . Pptx
    Correct
    Wrong
  • 4
    . Ppxt
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. ". Pptx"
Explanation :

1. The file extension in PowerPoint 2010 is .pptx.

2. It is an open XML (Open XML) format used in PowerPoint 2007 and later versions.

3. .pptx files can also be opened with other presentation software, such as OpenOffice Impress, Google Slides, and Apple Keynote.

Q:

C Programming language was developed by ___________.

930 0

  • 1
    Charles Babbage
    Correct
    Wrong
  • 2
    Larry Wall
    Correct
    Wrong
  • 3
    James Gosling
    Correct
    Wrong
  • 4
    Dennis Ritchie
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "Dennis Ritchie"

Q:

The main use of internet is?

929 0

  • 1
    Communication
    Correct
    Wrong
  • 2
    Education
    Correct
    Wrong
  • 3
    Financial Transaction
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "All of the above"

Q:

Which of the following statements is true?
 (I) Primary storage units have faster access time and less storage capacity than secondary storage units.
 (II) Primary storage units have sequential access.
 (III) Secondary storage units are non-volatile storage.

929 0

  • 1
    (I) and (II) only
    Correct
    Wrong
  • 2
    (I) and (III) only
    Correct
    Wrong
  • 3
    (II) and (III) only
    Correct
    Wrong
  • 4
    All (I), (II) and (III)
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "(I) and (III) only"
Explanation :

All of the following statements are true.

(I) Primary storage units have faster access time and less storage capacity than secondary storage units.

(II) Secondary storage units are non-volatile storage.

Q:

Hyperlink has parts?

927 0

  • 1
    Address of the webpage
    Correct
    Wrong
  • 2
    e-mail address
    Correct
    Wrong
  • 3
    any other link text or image
    Correct
    Wrong
  • 4
    All of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 4. "All of the above "

Q:

Internet search engine is an example of-

926 0

  • 1
    Windows
    Correct
    Wrong
  • 2
    Linux
    Correct
    Wrong
  • 3
    Yahoo
    Correct
    Wrong
  • 4
    MS Word
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 3. "Yahoo"

Q:

What are the types of attempts made by individuals to obtain confidential information by misrepresenting their identity?

925 0

  • 1
    Computer virus
    Correct
    Wrong
  • 2
    Phishing Scams
    Correct
    Wrong
  • 3
    Spyware Scams
    Correct
    Wrong
  • 4
    None of the above
    Correct
    Wrong
  • Show AnswerHide Answer
  • Workspace

Answer : 2. "Phishing Scams"
Explanation :

The types of attempts made by individuals to obtain confidential information by misrepresenting their identity are commonly referred to as "Phishing Scams." Phishing scams involve sending deceptive emails, messages, or websites that appear to be from a trustworthy source, such as a bank or government agency. These messages typically request sensitive information like passwords, credit card numbers, or social security numbers, with the intention of tricking individuals into revealing their confidential data. Phishing scams can also involve phone calls and text messages, and they often aim to exploit people's trust in order to commit fraud or identity theft.


      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully

      Report Error

    Please Enter Message
    Error Reported Successfully