Computer Objective Questions Practice Set -37

Last updated on November 30, 2021
18 mins read

Q1701. ________ refers to the unauthorized copying and distribution of software.,
(a) Plagiarism
(b) Software piracy
(c) Hacking
(d) Software literacy
(e) Cracking
Ans: (b) Software piracy is the unauthorized copying or distribution of copyrighted software. Software piracy can be done by copying, downloading, sharing, selling or installing multiple copies of software onto personal or work computers. Examples of software piracy include: I Distributing software or mobile apps from the Internet in a manner that violates the license terms; I Buying a single copy of a software program and installing it without authorization on multiple devices; I Making and/or sharing copies of installation CDs; I Sharing the login credentials (without authorization) used to access a web-based software application.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1702. Security procedures can _____.
(a) be inaccessible for the average home user
(b) reduce but not eliminate risks
(c) eliminate all computer security risks
(d) dissuade computer usage Ans: (b) In many ways, computer security is almost a statistical game. We can reduce but not eliminate the chance that we may be penetrated by an intruder or virus. This is mainly for one reason. No one can ever know all the software vulnerabilities of all software used on a system.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1703. If you change Windows 98 operating system to Windows XP, you are actually performing a(n)
(a) Pulldown
(b) Pushup
(c) Patch
(d) Upgrade
(e) Update
Ans: (d) Changing Windows 98 operating system to Windows XP is an example of upgrade. In computing, an upgrade is generally a replacement of hardware, software or firmware with a newer or better version, in order to bring the system up to date or to improve its characteristics.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1704. In the e-mail address [email protected]. “abc” is the
(a) password
(b) User name
(c) client computer
(d) server name Ans: (b) An email address consists of two parts. The part before the @ sign (local part) identifies the name of a mailbox. This is often the username of the sender/recipient, e.g., arvind. The part after the @ symbol is the domain name. It is the name of server that hosts our emails.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1705. FTP in computing stands for ________.
(a) File Tagging Program
(b) File Transfer Project
(c) File Transfer Program
(d) File Transfer Protocol
(e) File Tagging Protocol
Ans: (d) FTP stands for File Transfer Protocol. It is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on client-server architecture and uses separate control and data connections between the client and the server.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1706. The potential impact of a threat on a system is called as its _______.
(a) degree of harm
(b) danger potential
(c) susceptibility
(d) vulnerabilities
(e) countermeasures
Ans: (a) The negative consequence of an actualized threat is harm. Degree of harm evaluates the potential consequences on the system when the threat is successfully carried out. Degree of harm identifies three categories of a threat: low, medium and high. A threat is ranked as critical if it is likely and has high or medium potential impact.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1707. Which of the following refers to a technique for intercepting computer communications?
(a) Spoofing
(b) Phishing
(c) Pretexting
(d) Hacking
(e) Sniffing
Ans: (e) Sniffing is a technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network; with wireless networks, no such connection is required. Drive-by sniffers simply take computers with wireless connections through an area and search for unprotected wireless networks. They can monitor and intercept wireless traffic at will.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1708. Which of the following devices sends and receives data over telephone lines to and from computers?
(a) speaker
(b) sound card
(c) expansion slot
(d) printer
(e) modem
Ans: (e) A standard modem is a device that sends and receives data over telephone lines to and from computers. The modem is mounted on an expansion card, which is fitted into an expansion slot on the motherboard. This type of modem uses a dial up connection. There are also external modems.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1709. Which of the following users tunnelling protocol to securely send private network data over the Internet?
(a) WAN
(b) VPN
(c) LAN
(d) GPS Ans: (b) Virtual Private Network (VPN) uses a tunnel data transfer protocol to prepare the data for transfer. To prevent disclosure of private information, VPNs typically allow only authenticated remote access using tunneling protocols and encryption techniques. The VPN security model provides: confidentiality, sender authentication and message integrity.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1710. Which of the following refers to an upside down mouse?
(a) Trackboard
(b) Trackwell
(c) Trackball
(d) Trackpoint
(e) Trackpad
Ans: (c) Trackball is an upside-down mouse that rotates in place within a socket. The user rolls the ball to direct the cursor to the desired place on the screen and can click one of two buttons (like mouse buttons) near the trackball to select desktop objects or position the cursor for text entry.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1711. Which of the following is/are effective controls for detecting duplicate transactions such as payments made or received?
(a) Concurrency controls
(b) Concurrency controls and Referential integrity controls
(c) Reasonableness checks
(d) Time stamps
(e) Referential integrity controls
Ans: (d) Time stamps are an effective control for detecting duplicate transactions such as payments made or received. Timestamp-based concurrency control algorithm is a nonlock concurrency control method. It is used in some databases to safely handle transactions, using timestamps.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1712. Every host computer on the Internet has a(n} ___________.
(a) unique 10 digit number
(b) unique IP address
(c) similar IP address
(d) unique 15 digit number Ans: (b) Every host (computer) and every router on the internet has a unique address, called its IP address. This is a 32 bit address, which is attached to the datagram to indicate the source and destination of the packet. The IP address consists of two parts: one part identifies the network to which the host belongs and the other part is a unique number within that network.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1713. Which system conversion involves running the old and new system?
(a) Direct conversion
(b) Pilot conversion
(c) Parallel conversion
(d) Convergent conversion
(e) Phased conversion
Ans: (c) Parallel conversion involves running both the old system and the new system together for a period of time to compare the results of both so as to make sure the new one is working correctly. The main advantage is that there is much lower risk if something is wrong with the new system-the users can simply fall back on the old one.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1714. Converting the computer language of i’s and &’s to characters that a person can understand is called
(a) decoding
(b) generating
(c) selecting
(d) creating clip art
(e) None of these
Ans: (a) The only language computer hardware can understand is binary code consisting of 1s and 0s. Decoding is the conversion of an encoded format back into the original sequence of characters or decimal numbers and enables a person to read the associated content. The device that translates from the keyboard decimal numbers to binary is called an encoder; decoder translates from binary to decimal numbers.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1715. Which technology allows users to shift their desktop computing activities to computers on the Internet?
(a) solid-state storage
(b) Cloud computing
(c) distributed databases
(d) centralized databases Ans: (b) Cloud computing, also known as on-demand computing, is a kind of internet-based computing, where shared resources and information are provided to computers and other devices on-demand. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1716. ____ defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
(a) Semantics
(b) Sequence
(c) Syntax
(d) Serial
(e) None of these
Ans: (a) Semantics refers to the meaning of each section of bits. How is a particular pattern to be interpreted, and what action is to be taken based on that interpretation? For example, does an address identify the route to be taken of the final destination of the message?
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1717. _____ is a group of servers that share work and may be able to back each other up if one server fails.
(a) channel bank
(b) tiger team
(c) cluster
(d) logical unit
(e) serverless back up
Ans: (c) A group of several servers that share work and may be able to back each other up if one server fails is considered clustered. In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1718. TCP/IP stands-for ‘_______.
(a) Transmitter Control Protocol/ Internet Protocol
(b) Translation Computing Procedures/ International Protocol
(c) Transmission Contror Trocedures/ Internet Procedures
(d) Transmission Control Protocol/ Internet Protocol
(e) Transaction Computing Printing/ Internet Processing
Ans: (d) TCP stands for Transmission Control Protocol. It is a core protocol of the Internet protocol suite. It originated in the initial network implementation in which it complemented the Internet Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/ IP. TCP provides reliable, ordered, and error-checked delivery of a stream of octets between applications running on hosts communicating over an IP network.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1719. What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or food?
(a) Warm site
(b) Hot site
(c) Disaster recovery cost curve
(d) Buffer plan
(e) Disaster recovery plan
Ans: (e) A disaster recovery plan is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood. A good disaster recovery plan takes into consideration the location of the backup information. Storage Trek is a company that specializes in providing off-site information storage and disaster recovery solutions.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1720. Authorization is best characterized as ____________.
(a) Providing access to a resource according to the principle of least privilege
(b) Certifying a user’s authority
(c) Ensuring maximum utilization of resources
(d) Authenticating a user’s identity with a password
(e) A user providing an identity and a password
Ans: (a) Authorization is the process of granting of denying access rights and permissions to a protected resource, such as a network, a system, an application, a function, or a file. A key component of granting of denying access rights is the concept of “least privilege” that means users are granted only those access rights and permissions that they need to perform their official duties (Information Security by Nancy R. Kingsbur).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1721. Which programming languages are classified as low level languages?
(a) Algol
(b) C++
(c) Assembly Language
(d) COBOL
(e) Prolog 2
Ans: (c) An assembly language is a low-level programming language for a computer, or other programmable device, in which there is a very strong correspondence between the language and the architecture’s machine code instructions. Assembly language is converted into executable machine code by a utility program referred to as an assembler.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1722. URL is a reference to a resource on the internet, URL stands for ______.
(a) Uniform Resource Locator
(b) Universal Resource List
(c) Uniform Resource List
(d) Uniform Resource Locator
(e) Universal Resource List
Ans: (a) URL is an acronym for Uniform Resource Locator. Commonly informally referred to as a web address, it is a reference (an address) to a resource on the Internet. Most web browsers display the URL of a web page above the page in an address bar.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1723. Unwanted repetitious messages such as bulk mails is known as ______.
(a) Post
(b) Calibri
(c) Thrash
(d) Spam
(e) Courier
Ans: (d) Unsolicited bulk email messages are commonly called junk mail or spam. It involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. The opposite of “spam”, email which one wants, is called “ham”, usually when referring to a message’s automated analysis.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1724. Which of the following is not a computer programming language?
(a) Microsoft
(b) ALGOL
(c) COBOL
(d) C++
(e) C#
Ans: (a) Microsoft is an American multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office suite, and Internet Explorer and Edge web browsers.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1725. Verification of login name and password is known as ____.
(a) Authentication
(b) Alienation
(c) Configuration
(d) Logging in
(e) Certification
Ans: (a) Authentication involves the prevention of unauthorized access to computer systems. Authentication takes a variety of forms, ranging from verifying account credentials (a login name and password) to physical identity verification (using biometrics such as finger print scanning technology) to identifying that the client system from which a user is attempting to connect to a server is really the authorized client system. The most rudimentary and least secure level of authentication involves the use of a username and password to access a system.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1726. Which of the following is not a network topology?
(a) Star
(b) Tree
(c) Bus
(d) Car
(e) Ring
Ans: (d) Computers in a network have to be connected in some logical manner. The layout pattern of the interconnections between computers in a network is called network topology. There are a number of different types of network topologies, including point-topoint, bus, star, ring, mesh, tree and hybrid.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1727. A wireless network uses _____ waves to transmit signals.
(a) Electrical
(b) Electro–magnetic
(c) Radio
(d) Magnetic
(e) Mechanical
Ans: (c) A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. A computer’s wireless adapter translates data into a radio signal and transmits it using an antenna. A wireless router receives the signal and decodes it.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1728. In a MS Word document, Landscape is ______.
(a) paper size
(b) age orientation
(c) a Font style
(d) page layout
(e) a font effect
Ans: (b) Page orientation is the way in which a rectangular page is oriented for normal viewing. In MS Word, page orientation refers to the portrait (vertical) or landscape (horizontal) layout. In portrait orientation, height of the paper is larger than its width whereas in landscape orientation, the width is larger than the height.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1729. _______ is known as unauthorized access into others computer system.
(a) Encryption
(b) Editing
(c) Deletion
(d) Decryption
(e) Hacking
Ans: (e) Unauthorized Access is defined as when a person who does not have permission to connect to or use a system gains entry in a manner unintended by the system owner. The popular term for this is “hacking”. It is gaining access into any computer, network, storage medium, system, program, file, user area, or other private repository, without the express permission of the owner.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1730. In VLSI integrated circuit VLSI stands for ______.
(a) Very Low Scale Integration
(b) Very Low Security Information
(c) Very Largely Secured Information
(d) Very Large Scale Immunity
(e) Very Large Scale Integration
Ans: (e) VLSI stands for Very-largescale integration, the process of creating an integrated circuit (IC) by combining thousands of transistors into a single chip. The microprocessor is a VLSI device. Before the introduction of VLSI technology most ICs had a limited set of functions they could perform.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1731. Which files have .mpg extension?
(a) Text
(b) Spread sheet
(c) Video
(d)Web
(e) Executable
Ans: (c) MPG is a common digital video format standardized by the Moving Picture Experts Group. It typically incorporates MPEG-1 or MPEG-2 audio and video compression. Files with the .mpg extension often contain movies that are distributed over the Internet. The videos contained within the .mpg files are compressed video files.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1732. MICR technology is mainly used by banking industry. MICR denotes _______.
(a) Magnetic Ink Code Recognition
(b) Magnetic Ink Computer Reading
(c) Magnetic Ink Character Recognition
(d) Management Ink Check Reading
(e) Magnetic Ink Code Recognition
Ans: (c) MICR stands for Magnetic Ink Character Recognition. MICR Code is a character-recognition technology used mainly by the banking industry to ease the processing and clearance of cheques and other documents. Unlike barcodes and similar technologies, MICR characters can be read easily by humans.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1733. The term Internet backbone refers to
(a) The main pathway of highspeed communications lines through which all Internet traffic flows
(b) Software that operates a Web server
(c) A broadband Internet connection
(d) A set of numbers comprising an Internet address
(e) None of these
Ans: (a) The Internet backbone may be defined by the principal data routes between large, strategically interconnected computer networks and core routers on the Internet. These data routes are hosted by commercial, government, academic and other high-capacity network centers, the Internet exchange points and network access points that interchange Internet traffic between the countries, continents and across the oceans.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1734. Secure code/verified by VISA is associated in which of the following transactions?
(a) NEFT
(b) E–commerce
(c) Cash deposit
(d) Funds transfer
(e) Cash withdrawal
Ans: (b) Verified By Visa and MasterCard SecureCode is a mandatory requirement to make online purchases using credit cards or debit cards on Verified By Visa/MasterCard SecureCode enabled merchant websites. SecureCode is a private code that gives you an additional layer of online shopping security that makes ecommerce safer.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1735. Which of the following is correct statement?
(a) 1KB= 1024 bytes
(b) 1MB= 100 KB
(c) 1MB= 2048 bytes
(d) 1GB= 1024 KB
(e) 1KB= 100 bytes
Ans: (b) The International System of Units (SI) defines the prefix kilo as 1000 (103); therefore one kilobyte is 1000 bytes. In some fields of information technology kilobyte has traditionally also been used to denote 1024 (210) bytes, which arises from binary exponentiation common to digital circuitry.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1736. To move to the bottom of a MS Word document, press ______.
(a) Home
(b) Auto summarize
(c) Home key
(d) Ctrl + End
(e) Ctrl + Home
Ans: (d) In MS Word, the End key moves the cursor to the end of a line. The Ctrl + End keyboard combination moves the cursor to the end of a document, which includes any additional line or page breaks, tabs, spaces, etc.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1737. Mathematical calculations and comparison decisions are performed by the ___ of the CPU.
(a) Central calculation unit
(b) Numerical calculator
(c) Control unit
(d) Arithmetic logic unit
(e) Cache
Ans: (d) An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It represents the fundamental building block of the central processing unit (CPU) of a computer. In addition to ALUs, modern CPUs contain a control unit (CU).
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1738. Numbers are stored and transmitted inside a computer in ______.
(a) Alpha–numeric form
(b) CISC form
(c) Binary form
(d) ASCII code
(e) Alphabets form
Ans: (c) The data handled by a digital computer is stored, transmitted and manipulated as a stream of information ‘elements’ of two types, which can be denoted by the symbols 0 and
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1739. What is full form of W3C?
(a)World Wide Web Consortium
(b) World Wide Web Centre
(c)World Wide Web Company
(d)World Wide Web Command
(e) World Wide Web Corporation
Ans: (a) W3C stands for World Wide Web Consortium. Founded in October 1994 and currently led by Tim Berners-Lee, the consortium is made up of member organizations which maintain full-time staff for the purpose of working together in the development of standards for the World Wide Web.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1740. A computer network tool used to detect hosts or to test the reachability of a host on
(a) Ping
(b) Try
(c) Check
(d) View
(e) Lookup
Ans: (a) Ping (Packet InterNet Groper) is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer and back. Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1741. When any of the files or folders are deleted from Hard Disk, Windows ________.
(a) Places it in sticky notes
(b) Places it in snipping tools
(c) Places it in recycle bin
(d) Deletes it permanently
(e) Places it in Microsoft office
Ans: (c) In computing, the recycle bin is temporary storage for files that have been deleted in a file manager by the user, but not yet permanently erased from the file system. So when we delete a file from hard drive partition, it is still possible to recover the file from Recycle Bin. Even if we delete the file permanently from the Recycle Bin, it can still be recovered because Windows just mark the space the file occupies as available for new data storage.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1742. All the formulas in Excel start with
(a) =
(b) ^
(c) *
(d) %
(e) /
Ans: (a) All formulas in Excel must begin with an equals sign (=). This is because the cell contains, or is equal to, the formula and the value it calculates. Excel uses standard operators for formulas, such as a plus sign for addition (+), a minus sign for subtraction (-), an asterisk for multiplication (*), a forward slash for division (/), and a caret (^) for exponents.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1743. DNS in internet is abbreviation of ______.
(a) Dynamic Name Service
(b) Dynamic Network Service
(c) Domain Network Service
(d) Dynamic Naming System
(e) Domain Name System
Ans: (e) DNS is the acronym for Domain Name System. It is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates information with domain names assigned to each of the participating entities.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1744. Which of the following is the smallest data size?
(a) Gigabyte
(b) Terabyte
(c) Kilobyte
(d) Megabyte
(e) Petabyte
Ans: (c) The units of computer memory measurements are: 1 Bit = Binary Digit; 8 Bits = 1 Byte; 1024 Bytes = 1 KB (Kilo Byte); 1024 KB = 1 MB (Mega Byte); 1024 MB = 1 GB(Giga Byte); 1024 GB = 1 TB (Terra Byte); 1024 TB = 1 PB (Petabyte). So kilobyte is the smallest among the given units.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1745. In MS Word shortcut key, Ctrl + Z will ______.
(a) Redo the last action performed
(b) Opens the prints window
(c) Cut selected text
(d) Insert link
(e) Undo last action
Ans: (e) Ctrl + Z is the most used key combination to undo the previous action the user has made. It erases the last change done to the document reverting it to an older state. The opposite of undo is redo, a command that reverses the undo or advances the buffer to a more current state.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1746. The part of operating system that manages the essential peripherals such as
(a) Secondary system
(b) Basic Input/Output System
(c) Peripheral system
(d) Marginal system
(e) Title system
Ans: (b) BIOS (basic input/output system) is the program a personal computer’s microprocessor uses to get the computer system started after we turn it on. It also manages data flow between the computer’s operating system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1747. ______ displays the hierarchical structure of files, folders and drives on the computer and any network drives mapped to the computer.
(a) Google chrome
(b) Windows explorer
(c) Firefox
(d) Folder manager
(e) Internet explorer
Ans: (b) Windows Explorer displays the hierarchical structure of files, folders, and drives on our computer. It also shows any network drives that have been mapped to drive letters on our computer. Using Windows Explorer, we can copy, move, rename, and search for files and folders.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1748. Which among the following does not belong to the group?
(a) Hub
(b) Spyware
(c) Worm
(d) Virus
(e) Malware
Ans: (a) A hub is the connection point in a computer device where data from many directions converge and are then sent out in many directions to respective devices. It acts as a switch by preventing specific data packets from proceeding to a destination. Hubs and switches serve as a central connection for all of network equipment and handle a data type known as frames.
Computer Knowledge Question Bank for Competitve Exams
________________________________________
Q1749. A file which contains readymade layouts, theme effects, background styles and even contents for presentation is called _______.
(a) Wizard
(b) Pre formatting
(c) Auto style
(d) Pre styling
(e) Template
Ans: (e) A Microsoft Office Power- Point template is a special “starter” file type (.potx). When we open a template, a new presentation opens with content, layout, formatting, styles, and the theme applied to that template. Templates can contain layouts, theme colors, theme fonts, theme effects, background styles, and even content.
Computer Knowledge Question Bank for Competitve Exams

Q1750. What is the purpose of keeping electronic devices such as computers, televisions and remote controlled devices on sleep mode?
(a) To improve download speed
(b) For Back up
(c) To write contents of RAM to hard disk
(d) Reduce power consumption
(e) To enhance the memory
Ans: (d) Sleep mode is a low power mode for electronic devices such as computers, televisions, and remote controlled devices. These modes save significantly on electrical consumption compared to leaving a device fully on and, upon resume, allow the user to avoid having to reissue instructions or to wait for a machine to reboot.
Computer Knowledge Question Bank for Competitve Exams

Leave a Reply

Latest Posts

Previous Story

Computer Objective Questions Practice Set -36

Next Story

Computer Objective Questions Practice Set -38

Latest from Blog

Computer Class PDF Download

In this Post we share some Important Questions that Help to your exam The _ may also be called the screen or monitor.(a) scanner(b) printer(c) hard disk(d) software(e) display The primary purpose
computer architecture

computer architecture

Computer architecture refers to the fundamental design and organization of a computer system, including the instruction set architecture (ISA), the memory architecture, and the microarchitecture. It encompasses both the hardware and software
Go toTop