Computer GK â Set 6
Computer GK – Set 6
1) Phishing Attack is related to – Phishing Attack āĻāĻŋāĻšā§° āϏā§āϤ⧠āĻāĻĄāĻŧāĻŋāϤ ?
A) False Website (āύāĻāϞ ā§ąā§āĻŦāĻāĻžāĻāĻ) | B) Antivirus | C) Hardware | D) Networking
Ans: A) False Website
Explanation: Phishing uses fake websites to steal sensitive information like passwords and bank details. : PhishingāϤ āύāĻāϞ ā§ąā§āĻŦāĻāĻžāĻāĻ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻŋ password āĻā§°ā§ āĻŦā§āϝāĻā§āϤāĻŋāĻāϤ āϤāĻĨā§āϝ āĻā§ā§°āĻŋ āĻā§°āĻž āĻšāϝāĻŧāĨ¤
2) Which one is Utility Software ? āϤāϞ⧰ āĻā§āύāĻā§ Utility Software ?
A) MS Word | B) WinZip | C) Photoshop | D) Chrome
Ans: B) WinZip
Explanation: WinZip is used for compressing and extracting files. : WinZip āĻĢāĻžāĻāϞ compress āĻā§°ā§ extract āĻā§°āĻŋāĻŦāϞ⧠āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻšāϝāĻŧāĨ¤
3) Which one is considered as the brain of a computer ? āĻāĻŽā§āĻĒāĻŋāĻāĻāĻžā§°ā§° āĻŽāĻāĻā§ (brain) āĻāĻžāĻ āĻā§ā§ąāĻž āĻšāϝāĻŧ ?
A) Monitor | B) Processor (CPU) | C) Keyboard | D) Mouse
Ans: B) Processor (CPU)
Explanation: CPU controls all operations and processes data. : CPU āϏāĻāϞ⧠āĻāĻžāĻŽ āύāĻŋāϝāĻŧāύā§āϤā§ā§°āĻŖ āĻā§°ā§ āĻā§°ā§ data process āĻā§°ā§āĨ¤
4) Bluetooth technology uses – Bluetooth technology āĻāĻŋāĻšā§° āĻāĻĒā§°āϤ āĻāϧāĻžā§°āĻŋāϤ ?
A) Infrared | B) Cable | C) Radio Wave | D) Fiber
Ans: C) Radio Wave
Explanation: Bluetooth uses low-power radio waves for wireless communication. : BluetoothāϤ radio wave āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻā§°āĻŋ wireless āϏāĻāϝā§āĻ āĻā§°āĻž āĻšāϝāĻŧāĨ¤
5) Which one is a High-Level Programming Language ? āϤāϞ⧰ āĻā§āύāĻā§ High-Level Programming Language ?
A) Machine Language | B) Assembly | C) Python | D) Binary
Ans: C) Python
Explanation: Python is easy to read and widely used high-level language. : Python āĻāĻāĻž āϏāĻšāĻ āĻā§°ā§ āĻŦāĻšā§āϞ āĻŦā§āĻ¯ā§ąāĻšā§āϤ high-level āĻāĻžāώāĻžāĨ¤
6) Which device is mainly related to network security ? Network securityā§° āϏā§āϤ⧠āĻā§āύ device āĻāĻĄāĻŧāĻŋāϤ ?
A) Router | B) Firewall | C) Switch | D) Hub
Ans: B) Firewall
Explanation: Firewall blocks unauthorized access and protects networks. : Firewall āĻ
āύāϧāĻŋāĻāĻžāϰ āĻĒā§ā§°ā§ąā§āĻļ āĻŦāύā§āϧ āĻā§°āĻŋ network āϏā§ā§°āĻā§āώāĻŋāϤ ā§°āĻžāĻā§āĨ¤
7) Which one is the strongest password ? āϤāϞ⧰ āĻā§āύāĻā§ āĻāĻāĻžāĻāϤāĻā§ āĻļāĻā§āϤāĻŋāĻļāĻžāϞ⧠password ?
A) 123456 | B) $4Rr#345we#jan21$ | C) password123 | D) abc123
Ans: B) $4Rr#345we#jan21$
Explanation: Strong passwords include mixed characters, numbers, and symbols. : āĻļāĻā§āϤāĻŋāĻļāĻžāϞ⧠passwordāϤ āĻāĻā§°, āϏāĻāĻā§āϝāĻž āĻā§°ā§ āĻāĻŋāĻšā§āύ āĻĨāĻžāĻā§āĨ¤
8) Which communication media is needed for online banking from plane/ship ? āĻŦāĻŋāĻŽāĻžāύ āĻŦāĻž āĻāĻžāĻšāĻžāĻā§° āĻĒā§°āĻž online banking āĻā§°āĻŋāĻŦāϞ⧠āĻā§āύ communication media āϞāĻžāĻā§ ?
A) Wi-Fi | B) Fiber | C) Satellite | D) LAN
Ans: C) Satellite
Explanation: Satellite provides connectivity in remote areas. : āĻĻā§ā§°ā§ąā§°ā§āϤ⧠āĻ āĻžāĻāϤ satellite āϏāĻāϝā§āĻ āĻŦā§āĻ¯ā§ąāĻšāĻžā§° āĻšāϝāĻŧāĨ¤
9) One Terabyte equals how many bytes ? 1 Terabyte āĻāĻŋāĻŽāĻžāύ byte āϏāĻŽāĻžāύ ?
A) 10âļ | B) 10âš | C) 10¹¹ | D) 10¹²
Ans: D) 10¹² Bytes
Explanation: 1 TB = 1,000,000,000,000 bytes (decimal system). : 1 TB = ā§§ā§Ļ¹² byte (decimal āĻĒāĻĻā§āϧāϤāĻŋ)āĨ¤