Computer GK – Set 6


Computer GK – Set 6


1) Phishing Attack is related to – Phishing Attack āĻ•āĻŋāĻšā§° āϏ⧈āϤ⧇ āϜāĻĄāĻŧāĻŋāϤ ?


A) False Website (āύāĻ•āϞ ā§ąā§‡āĻŦāϚāĻžāχāϟ) | B) Antivirus | C) Hardware | D) Networking


Ans: A) False Website


Explanation: Phishing uses fake websites to steal sensitive information like passwords and bank details. : PhishingāϤ āύāĻ•āϞ ā§ąā§‡āĻŦāϚāĻžāχāϟ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻŋ password āφ⧰⧁ āĻŦā§āϝāĻ•ā§āϤāĻŋāĻ—āϤ āϤāĻĨā§āϝ āϚ⧁⧰āĻŋ āϕ⧰āĻž āĻšāϝāĻŧāĨ¤


2) Which one is Utility Software ? āϤāϞ⧰ āϕ⧋āύāĻŸā§‹ Utility Software ?


A) MS Word | B) WinZip | C) Photoshop | D) Chrome


Ans: B) WinZip


Explanation: WinZip is used for compressing and extracting files. : WinZip āĻĢāĻžāχāϞ compress āφ⧰⧁ extract āϕ⧰āĻŋāĻŦāϞ⧈ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻšāϝāĻŧāĨ¤


3) Which one is considered as the brain of a computer ? āĻ•āĻŽā§āĻĒāĻŋāωāϟāĻžā§°ā§° āĻŽāĻ—āϜ⧁ (brain) āĻ•āĻžāĻ• āĻ•ā§‹ā§ąāĻž āĻšāϝāĻŧ ?


A) Monitor | B) Processor (CPU) | C) Keyboard | D) Mouse


Ans: B) Processor (CPU)
Explanation: CPU controls all operations and processes data. : CPU āϏāĻ•āϞ⧋ āĻ•āĻžāĻŽ āύāĻŋāϝāĻŧāĻ¨ā§āĻ¤ā§ā§°āĻŖ āϕ⧰⧇ āφ⧰⧁ data process āϕ⧰⧇āĨ¤


4) Bluetooth technology uses – Bluetooth technology āĻ•āĻŋāĻšā§° āĻ“āĻĒā§°āϤ āφāϧāĻžā§°āĻŋāϤ ?


A) Infrared | B) Cable | C) Radio Wave | D) Fiber


Ans: C) Radio Wave
Explanation: Bluetooth uses low-power radio waves for wireless communication. : BluetoothāϤ radio wave āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āϕ⧰āĻŋ wireless āϏāĻ‚āϝ⧋āĻ— āϕ⧰āĻž āĻšāϝāĻŧāĨ¤


5) Which one is a High-Level Programming Language ? āϤāϞ⧰ āϕ⧋āύāĻŸā§‹ High-Level Programming Language ?


A) Machine Language | B) Assembly | C) Python | D) Binary


Ans: C) Python
Explanation: Python is easy to read and widely used high-level language. : Python āĻāϟāĻž āϏāĻšāϜ āφ⧰⧁ āĻŦāĻšā§āϞ āĻŦā§āĻ¯ā§ąāĻšā§ƒāϤ high-level āĻ­āĻžāώāĻžāĨ¤


6) Which device is mainly related to network security ? Network securityā§° āϏ⧈āϤ⧇ āϕ⧋āύ device āϜāĻĄāĻŧāĻŋāϤ ?


A) Router | B) Firewall | C) Switch | D) Hub


Ans: B) Firewall
Explanation: Firewall blocks unauthorized access and protects networks. : Firewall āĻ…āύāϧāĻŋāĻ•āĻžāϰ āĻĒā§ā§°ā§ąā§‡āĻļ āĻŦāĻ¨ā§āϧ āϕ⧰āĻŋ network āϏ⧁⧰āĻ•ā§āώāĻŋāϤ ā§°āĻžāϖ⧇āĨ¤


7) Which one is the strongest password ? āϤāϞ⧰ āϕ⧋āύāĻŸā§‹ āφāϟāĻžāχāϤāĻ•ā§ˆ āĻļāĻ•ā§āϤāĻŋāĻļāĻžāϞ⧀ password ?


A) 123456 | B) $4Rr#345we#jan21$ | C) password123 | D) abc123


Ans: B) $4Rr#345we#jan21$
Explanation: Strong passwords include mixed characters, numbers, and symbols. : āĻļāĻ•ā§āϤāĻŋāĻļāĻžāϞ⧀ passwordāϤ āφāĻ–ā§°, āϏāĻ‚āĻ–ā§āϝāĻž āφ⧰⧁ āϚāĻŋāĻšā§āύ āĻĨāĻžāϕ⧇āĨ¤


8) Which communication media is needed for online banking from plane/ship ? āĻŦāĻŋāĻŽāĻžāύ āĻŦāĻž āϜāĻžāĻšāĻžāϜ⧰ āĻĒā§°āĻž online banking āϕ⧰āĻŋāĻŦāϞ⧈ āϕ⧋āύ communication media āϞāĻžāϗ⧇ ?


A) Wi-Fi | B) Fiber | C) Satellite | D) LAN


Ans: C) Satellite
Explanation: Satellite provides connectivity in remote areas. : āĻĻā§‚ā§°ā§ąā§°ā§āϤ⧀ āĻ āĻžāχāϤ satellite āϏāĻ‚āϝ⧋āĻ— āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻšāϝāĻŧāĨ¤


9) One Terabyte equals how many bytes ? 1 Terabyte āĻ•āĻŋāĻŽāĻžāύ byte āϏāĻŽāĻžāύ ?


A) 10âļ | B) 10⁚ | C) 10¹¹ | D) 10¹²


Ans: D) 10¹² Bytes
Explanation: 1 TB = 1,000,000,000,000 bytes (decimal system). : 1 TB = ā§§ā§Ļ¹² byte (decimal āĻĒāĻĻā§āϧāϤāĻŋ)āĨ¤