Computer GK Questions and Answers - Set 36

1.       Firewalls are used to protect a communication network system against
(A) Unauthorized attacks       (B) Virus attacks
(C) Data-driven attacks           (D) Fire-attacks
Answer: A
2.       HTML is used to create
(A) machine language program        (B) high level program
(C) web page                                        (D) web server
Answer: C
3.       The process of laying out a document with text, graphics, headlines and photographs is involved in
(A) Deck Top Publishing        (B) Desk Top Printing
(C) Desk Top Publishing       (D) Deck Top Printing
Answer: C
4.       Transfer of data from one application to another line is known as
(A) Dynamic Disk Exchange                         (B) Dodgy Data Exchange
(C) Dogmatic Data Exchange           (D) Dynamic Data Exchange
Answer: D
5.       Networking of libraries through electronic media is known as
(A) Inflibnet       (B) Libinfnet
(C) Internet       (D) HTML
Answer: A

6.       A …………. is a collection of data that is stored electronically as a series of records in a table.
(A) spreadsheet           (B) presentation
(C) database                 (D) MS Word
Answer: C
7.       Changing an existing document is called …………. the document.
(A) editing         (B) modifying
(C) adjusting     (D) creating
Answer: A
8.       The hardware device commonly referred to as the ‘brain’ of the Computer is the ……….…
(A) RAM chip    (B) data input
(C) CPU                        (D) secondary storage
Answer: C
9.       Statistical calculations and preparation of tables and graphs can be done using
(A) Adobe Photoshop             (B) Excel
(C) Notepad                              (D) Power Point
Answer: B
10.    Nod 32, Norton and Panda are
(A) Search engines                 (B) Operating Systems
(C) Antivirus software             (D) Internet browsers
Answer: C

Post a Comment