[1] Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
A.
New Disk
B.
Hard disk
C.
Permanent disk
D.
Optical disk
Ans:
Hard disk
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[2] Who invented the QWERTY keyboard?
A.
Carl Sholes
B.
Karl Sholes
C.
Christopher Latham Sholes
D.
Khristopher Sholes
Ans:
Christopher Latham Sholes
Explanation :
The arrangement of characters on a QWERTY keyboard was designed in 1868 by Christopher Sholes, the inventor of the typewriter. According to popular myth, Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
[3] Artificial intelligence is used in which of the following generations of computers?
A.
Second
B.
Third
C.
Fourth
D.
Fifth
Ans:
Fifth
Explanation :
Fifth Generation: Artificial Intelligence (Present and Beyond) Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today.
[4] Which of the following computers exhibits the features of both analog the digital computers?
A.
Hybrid computer
B.
Mini computer
C.
Laptop
D.
Mainframe computer
Ans:
Hybrid computer
Explanation :
The computer that exhibits the features of both digital and analog computers is known as a hybrid computer.
[5] These printers do not establish any mechanical contact between the print head and the paper. The examples of such type of printers are
A.
line printers, drum printers
B.
drum printers and dot-matrix printers
C.
line printers and dot-matrix printers
D.
inkjet and laser printers
Ans:
inkjet and laser printers
Explanation :
Non-impact printer does not establish any mechanical contact between the print head and the paper. The well-known non-impact printers are inkjet and laser printers.
[6] is a service that allows organizations to make their own website.
A.
Web hosting
B.
Web surfing
C.
Domain hosting
D.
Linux hosting
Ans:
Web hosting
Explanation :
Web hosting is a service that allows organisations to make their own website accessible through WWW. This service allows you to share the data on the Web or the Internet by storing your Web page on the Internet.
[7] Which of the following HTML tags is used to create a horizontal line on a Web page?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, you can create a horizontal line on a Web page by using the
tag. The purpose of the
tag is to separate paragraphs or sections on a Web page.
[8] Which of the following image formats was developed for CompuServe?
A.
JPEG Image
B.
GIF Image
C.
PNG Image
D.
BMP Image
Ans:
GIF Image
Explanation :
The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.
[9] Which among the following is a Super computer series developed by Indian scientists?
A.
Param
B.
Super30l
C.
Compaq Presario
D.
Cray YMP
Ans:
Param
Explanation :
PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.
[10] Which of the following is the foray introduced by Microsoft into the gaming console market?
A.
X-box
B.
Set-up
C.
Multi play
D.
I-phone
Ans:
X-box
Explanation :
In the gaming console market, Microsoft launched its first foray named X-box that is actually a video game console.
[11] What is the maximum number of lines you can set for a Drop Cap?
A.
6
B.
10
C.
15
D.
56
Ans:
10
Explanation :
A drop cap refers to a large letter positioned at the beginning of a text. It can have the depth of a maximum of ten lines of regular text.
[12] If you wish to extend the length of the network without having the signal degrade, you would use a .
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[13] is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
A.
Trojan horse
B.
Adware
C.
Spyware
D.
Worm
Ans:
Trojan horse
Explanation :
Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.
[14] If you wish to extend the length of the network without having the signal degrade, you would use a _.
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.
[2] Who invented the QWERTY keyboard?
A.
Carl Sholes
B.
Karl Sholes
C.
Christopher Latham Sholes
D.
Khristopher Sholes
Ans:
Christopher Latham Sholes
Explanation :
The arrangement of characters on a QWERTY keyboard was designed in 1868 by Christopher Sholes, the inventor of the typewriter. According to popular myth, Sholes arranged the keys in their odd fashion to prevent jamming on mechanical typewriters by separating commonly used letter combinations.
[3] Artificial intelligence is used in which of the following generations of computers?
A.
Second
B.
Third
C.
Fourth
D.
Fifth
Ans:
Fifth
Explanation :
Fifth Generation: Artificial Intelligence (Present and Beyond) Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today.
[4] Which of the following computers exhibits the features of both analog the digital computers?
A.
Hybrid computer
B.
Mini computer
C.
Laptop
D.
Mainframe computer
Ans:
Hybrid computer
Explanation :
The computer that exhibits the features of both digital and analog computers is known as a hybrid computer.
[5] These printers do not establish any mechanical contact between the print head and the paper. The examples of such type of printers are
A.
line printers, drum printers
B.
drum printers and dot-matrix printers
C.
line printers and dot-matrix printers
D.
inkjet and laser printers
Ans:
inkjet and laser printers
Explanation :
Non-impact printer does not establish any mechanical contact between the print head and the paper. The well-known non-impact printers are inkjet and laser printers.
[6] is a service that allows organizations to make their own website.
A.
Web hosting
B.
Web surfing
C.
Domain hosting
D.
Linux hosting
Ans:
Web hosting
Explanation :
Web hosting is a service that allows organisations to make their own website accessible through WWW. This service allows you to share the data on the Web or the Internet by storing your Web page on the Internet.
[7] Which of the following HTML tags is used to create a horizontal line on a Web page?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, you can create a horizontal line on a Web page by using the
tag. The purpose of the
tag is to separate paragraphs or sections on a Web page.
[8] Which of the following image formats was developed for CompuServe?
A.
JPEG Image
B.
GIF Image
C.
PNG Image
D.
BMP Image
Ans:
GIF Image
Explanation :
The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.
[9] Which among the following is a Super computer series developed by Indian scientists?
A.
Param
B.
Super30l
C.
Compaq Presario
D.
Cray YMP
Ans:
Param
Explanation :
PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.
[10] Which of the following is the foray introduced by Microsoft into the gaming console market?
A.
X-box
B.
Set-up
C.
Multi play
D.
I-phone
Ans:
X-box
Explanation :
In the gaming console market, Microsoft launched its first foray named X-box that is actually a video game console.
[11] What is the maximum number of lines you can set for a Drop Cap?
A.
6
B.
10
C.
15
D.
56
Ans:
10
Explanation :
A drop cap refers to a large letter positioned at the beginning of a text. It can have the depth of a maximum of ten lines of regular text.
[12] If you wish to extend the length of the network without having the signal degrade, you would use a .
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[13] is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
A.
Trojan horse
B.
Adware
C.
Spyware
D.
Worm
Ans:
Trojan horse
Explanation :
Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.
[14] If you wish to extend the length of the network without having the signal degrade, you would use a _.
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
Fifth Generation: Artificial Intelligence (Present and Beyond) Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today.
[4] Which of the following computers exhibits the features of both analog the digital computers?
A.
Hybrid computer
B.
Mini computer
C.
Laptop
D.
Mainframe computer
Ans:
Hybrid computer
Explanation :
The computer that exhibits the features of both digital and analog computers is known as a hybrid computer.
[5] These printers do not establish any mechanical contact between the print head and the paper. The examples of such type of printers are
A.
line printers, drum printers
B.
drum printers and dot-matrix printers
C.
line printers and dot-matrix printers
D.
inkjet and laser printers
Ans:
inkjet and laser printers
Explanation :
Non-impact printer does not establish any mechanical contact between the print head and the paper. The well-known non-impact printers are inkjet and laser printers.
[6] is a service that allows organizations to make their own website.
A.
Web hosting
B.
Web surfing
C.
Domain hosting
D.
Linux hosting
Ans:
Web hosting
Explanation :
Web hosting is a service that allows organisations to make their own website accessible through WWW. This service allows you to share the data on the Web or the Internet by storing your Web page on the Internet.
[7] Which of the following HTML tags is used to create a horizontal line on a Web page?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, you can create a horizontal line on a Web page by using the
tag. The purpose of the
tag is to separate paragraphs or sections on a Web page.
[8] Which of the following image formats was developed for CompuServe?
A.
JPEG Image
B.
GIF Image
C.
PNG Image
D.
BMP Image
Ans:
GIF Image
Explanation :
The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.
[9] Which among the following is a Super computer series developed by Indian scientists?
A.
Param
B.
Super30l
C.
Compaq Presario
D.
Cray YMP
Ans:
Param
Explanation :
PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.
[10] Which of the following is the foray introduced by Microsoft into the gaming console market?
A.
X-box
B.
Set-up
C.
Multi play
D.
I-phone
Ans:
X-box
Explanation :
In the gaming console market, Microsoft launched its first foray named X-box that is actually a video game console.
[11] What is the maximum number of lines you can set for a Drop Cap?
A.
6
B.
10
C.
15
D.
56
Ans:
10
Explanation :
A drop cap refers to a large letter positioned at the beginning of a text. It can have the depth of a maximum of ten lines of regular text.
[12] If you wish to extend the length of the network without having the signal degrade, you would use a .
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[13] is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
A.
Trojan horse
B.
Adware
C.
Spyware
D.
Worm
Ans:
Trojan horse
Explanation :
Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.
[14] If you wish to extend the length of the network without having the signal degrade, you would use a _.
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
Non-impact printer does not establish any mechanical contact between the print head and the paper. The well-known non-impact printers are inkjet and laser printers.
[6] is a service that allows organizations to make their own website.
A.
Web hosting
B.
Web surfing
C.
Domain hosting
D.
Linux hosting
Ans:
Web hosting
Explanation :
Web hosting is a service that allows organisations to make their own website accessible through WWW. This service allows you to share the data on the Web or the Internet by storing your Web page on the Internet.
[7] Which of the following HTML tags is used to create a horizontal line on a Web page?
A.
B.
C.
D.
Ans:
Explanation :
In HTML, you can create a horizontal line on a Web page by using the
tag. The purpose of the
tag is to separate paragraphs or sections on a Web page.
[8] Which of the following image formats was developed for CompuServe?
A.
JPEG Image
B.
GIF Image
C.
PNG Image
D.
BMP Image
Ans:
GIF Image
Explanation :
The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.
[9] Which among the following is a Super computer series developed by Indian scientists?
A.
Param
B.
Super30l
C.
Compaq Presario
D.
Cray YMP
Ans:
Param
Explanation :
PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.
[10] Which of the following is the foray introduced by Microsoft into the gaming console market?
A.
X-box
B.
Set-up
C.
Multi play
D.
I-phone
Ans:
X-box
Explanation :
In the gaming console market, Microsoft launched its first foray named X-box that is actually a video game console.
[11] What is the maximum number of lines you can set for a Drop Cap?
A.
6
B.
10
C.
15
D.
56
Ans:
10
Explanation :
A drop cap refers to a large letter positioned at the beginning of a text. It can have the depth of a maximum of ten lines of regular text.
[12] If you wish to extend the length of the network without having the signal degrade, you would use a .
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[13] is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
A.
Trojan horse
B.
Adware
C.
Spyware
D.
Worm
Ans:
Trojan horse
Explanation :
Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.
[14] If you wish to extend the length of the network without having the signal degrade, you would use a _.
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
C.
D.
Ans:
Explanation :
In HTML, you can create a horizontal line on a Web page by using the
tag. The purpose of the
tag is to separate paragraphs or sections on a Web page.
tag. The purpose of the
tag is to separate paragraphs or sections on a Web page.
[8] Which of the following image formats was developed for CompuServe?
A.
JPEG Image
B.
GIF Image
C.
PNG Image
D.
BMP Image
Ans:
GIF Image
Explanation :
The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.
[9] Which among the following is a Super computer series developed by Indian scientists?
A.
Param
B.
Super30l
C.
Compaq Presario
D.
Cray YMP
Ans:
Param
Explanation :
PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.
[10] Which of the following is the foray introduced by Microsoft into the gaming console market?
A.
X-box
B.
Set-up
C.
Multi play
D.
I-phone
Ans:
X-box
Explanation :
In the gaming console market, Microsoft launched its first foray named X-box that is actually a video game console.
[11] What is the maximum number of lines you can set for a Drop Cap?
A.
6
B.
10
C.
15
D.
56
Ans:
10
Explanation :
A drop cap refers to a large letter positioned at the beginning of a text. It can have the depth of a maximum of ten lines of regular text.
[12] If you wish to extend the length of the network without having the signal degrade, you would use a .
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[13] is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
A.
Trojan horse
B.
Adware
C.
Spyware
D.
Worm
Ans:
Trojan horse
Explanation :
Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.
[14] If you wish to extend the length of the network without having the signal degrade, you would use a _.
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
The GIF image format was developed for CompuServe (an online information service). Converting an image to a GIF image format is safe as no data is lost at the time of conversion.
[9] Which among the following is a Super computer series developed by Indian scientists?
A.
Param
B.
Super30l
C.
Compaq Presario
D.
Cray YMP
Ans:
Param
Explanation :
PARAM is a series of supercomputers designed and assembled by the Centre for Development of Advanced Computing (C-DAC) in Pune, India. The latest machine in the series is the PARAM Kanchenjunga.
[10] Which of the following is the foray introduced by Microsoft into the gaming console market?
A.
X-box
B.
Set-up
C.
Multi play
D.
I-phone
Ans:
X-box
Explanation :
In the gaming console market, Microsoft launched its first foray named X-box that is actually a video game console.
[11] What is the maximum number of lines you can set for a Drop Cap?
A.
6
B.
10
C.
15
D.
56
Ans:
10
Explanation :
A drop cap refers to a large letter positioned at the beginning of a text. It can have the depth of a maximum of ten lines of regular text.
[12] If you wish to extend the length of the network without having the signal degrade, you would use a .
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[13] is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
A.
Trojan horse
B.
Adware
C.
Spyware
D.
Worm
Ans:
Trojan horse
Explanation :
Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.
[14] If you wish to extend the length of the network without having the signal degrade, you would use a _.
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
In the gaming console market, Microsoft launched its first foray named X-box that is actually a video game console.
[11] What is the maximum number of lines you can set for a Drop Cap?
A.
6
B.
10
C.
15
D.
56
Ans:
10
Explanation :
A drop cap refers to a large letter positioned at the beginning of a text. It can have the depth of a maximum of ten lines of regular text.
[12] If you wish to extend the length of the network without having the signal degrade, you would use a .
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[13] is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
A.
Trojan horse
B.
Adware
C.
Spyware
D.
Worm
Ans:
Trojan horse
Explanation :
Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.
[14] If you wish to extend the length of the network without having the signal degrade, you would use a _.
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[13] is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
A.
Trojan horse
B.
Adware
C.
Spyware
D.
Worm
Ans:
Trojan horse
Explanation :
Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.
[14] If you wish to extend the length of the network without having the signal degrade, you would use a _.
A.
Repeater
B.
Router
C.
Gateway
D.
Switch
Ans:
Repeater
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.
[15] Which disk is used to cold boot a PC?
A.
Setup disk
B.
System disk
C.
Diagnostic Disk
D.
Program disk
Ans:
System disk
Explanation :
System disk is used to cold boot a PC. It is the system disk because the other disks may boot a PC, but they also perform added functions beyond booting the PC.
[16] A(n) allows you to access your e-mail from anywhere.
A.
Forum
B.
Webmail interface
C.
Message Board
D.
Weblog
Ans:
Webmail interface
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Roundcube and SquirrelMail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com and Yahoo!
[17] Which of the following options is used to display information such as title, page number of the document?
A.
Insert Table
B.
Header and Footer
C.
Thesaurus
D.
Spelling and Grammar
Ans:
Header and Footer
Explanation :
The header is a section of the document that appears in the top margin, while the footer is a section of the document that appears in the bottom margin. Headers and footers generally contain information such as the page number, date, and document name.
[18] Which icon represents an e-mail message that has not been read?
A.
Question Mark
B.
Red envelope
C.
Highlighted envelope
D.
Closed envelope
Ans:
Closed envelope
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
Closed envelope icon represents an e-mail message that has not been read.
[19] Which among the given options is computer peripheral that is tangible?
A.
menu
B.
Print
C.
Software
D.
Hardware
Ans:
Hardware
Explanation :
Hardware is tangible component of a computer system i.e. they are perceptible by touch.
[20] A collection of unprocessed items is _.
A.
information
B.
data
C.
memory
D.
reports
Ans:
data
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
Data is collection of unprocessed items.
[21] Which type of system can learn and adjust to new circumstances by themselves?
A.
Database management system
B.
Expert systems
C.
Geographical systems
D.
Neural networks
Ans:
Neural networks
Explanation :
Neural networks can adjust to new circumstances by themselves.
[22] WORM stands for?
A.
Write Once Read Many
B.
Wanted Once Read Memory
C.
Wanted Original Read Memory
D.
Write Original Read Memory
Ans:
Write Once Read Many
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
In computer storage media, WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.
[23] Which of the following elements are used in an e-mail to express emotions of feelings clearly?
A.
Acronyms
B.
Abbreviations
C.
Rich text
D.
Emotions or smileys
Ans:
Emotions or smileys
Explanation :
Emoticons or smileys are elements that help you express your emotions or feelings more clearly in your e-mail. They provide a more direct and funny way to express yourself in addition to the words you use in your e-mail message.
[24] Which of the following forms a part of a search engine?
A.
Spiders or Web crawlers
B.
Indexing software
C.
Search algorithm
D.
All of these
Ans:
All of these
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
Explanation :
The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.
[25] Copy and X Copy are same in the sense _.
A.
Both are internal command of DOS
B.
Both are external commands of DOS
C.
Both can be used to copy file or group of files
D.
Both a and b
Ans:
Both can be used to copy file or group of files
Explanation :
Copy and X Copy both can be used to copy file or group of files.
GK INFOPEDIA © 2022
