SSC CGL Exam  >  SSC CGL Tests  >  SSC CGL Tier II Mock Test Series 2024  >  Computer Knowledge - 9 - SSC CGL MCQ

Computer Knowledge - 9 - SSC CGL MCQ


Test Description

20 Questions MCQ Test SSC CGL Tier II Mock Test Series 2024 - Computer Knowledge - 9

Computer Knowledge - 9 for SSC CGL 2024 is part of SSC CGL Tier II Mock Test Series 2024 preparation. The Computer Knowledge - 9 questions and answers have been prepared according to the SSC CGL exam syllabus.The Computer Knowledge - 9 MCQs are made for SSC CGL 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Knowledge - 9 below.
Solutions of Computer Knowledge - 9 questions in English are available as part of our SSC CGL Tier II Mock Test Series 2024 for SSC CGL & Computer Knowledge - 9 solutions in Hindi for SSC CGL Tier II Mock Test Series 2024 course. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free. Attempt Computer Knowledge - 9 | 20 questions in 15 minutes | Mock test for SSC CGL preparation | Free important questions MCQ to study SSC CGL Tier II Mock Test Series 2024 for SSC CGL Exam | Download free PDF with solutions
Computer Knowledge - 9 - Question 1

Which of the following input devices is widely used in tests such as aptitude tests?

Detailed Solution for Computer Knowledge - 9 - Question 1
  • The correct answer is Optical mark recognition.

Key Points

  • Optical Mark Recognition (OMR):
    • It is a technology that enables a machine to recognize marks made on a paper form, such as ticks, bubbles, or checkmarks.
    • OMR is used to quickly and accurately capture information from paper forms, making it ideal for high-volume data collection.

Additional Information

  • A barcode reader or barcode scanner:
    • It is an optical scanner that can read printed barcodes, decode the data contained in the barcode to a computer.
    • Like a flatbed scanner, it consists of a light source, a lens and a light sensor for translating optical impulses into electrical signals.
  • Magnetic ink character recognition code:
    • It is known in short as MICR code, is a character recognition technology used mainly by the banking industry to streamline the processing and clearance of cheques and other documents.
  • A touchpad or trackpad:
    • It is a pointing device featuring a tactile sensor, a specialized surface that can translate the motion and position of a user's fingers to a relative position on the operating system that is made output to the screen.
    • Touchpads are a common feature of laptop computers as opposed to using a mouse on a desktop, and are also used as a substitute for a mouse where desk space is scarce.
Computer Knowledge - 9 - Question 2

Which of the following is NOT a valid file format in MS-Word 365?

Detailed Solution for Computer Knowledge - 9 - Question 2

The correct answer is .dcp.

Key Points

The file format ".dcp" is not a valid file format in MS Word 365. The dotx, doc, docx are valid file formats:

  • .dotx: It is a template file format that allows users to create reusable document templates with preset formatting and styles.
  • .doc: However, it is the file format used in older versions of MS Word (prior to MS Word 2007) and is known as the "Word 97-2003 Document" format. Although MS Word 365 primarily uses the .docx format, it can still open and work with .doc files.
  • .docx: This is the default file format in MS Word 365 for saving documents. It is an XML-based file format introduced with MS Word 2007 and has since become the standard format for MS Word documents. The .docx format supports advanced features, improved compatibility, and better file size optimization compared to the older .doc format.

Additional Information

1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Knowledge - 9 - Question 3

Which of the following memory is used to bridge the gap between the speed of CPU and RAM?

Detailed Solution for Computer Knowledge - 9 - Question 3

The correct answer is Cache memory.

Key Points

  • Cache memory is used to bridge the gap between the speed of CPU and RAM.
    • Cache memory is used to reduce the average memory access times. This is done by storing the data that is frequently accessed in main memory addresses, therefore, allowing the CPU to access the data faster.
    • Cache memory is a chip-based computer component that improves the efficiency with which data is retrieved from the computer's memory.
      • It serves as a temporary storage place from which the computer's processor may readily retrieve data.
      • This temporary storage space, known as a cache, is more accessible to the CPU than the computer's primary memory source, which is often DRAM.
    • Cache memory is sometimes known as CPU memory since it is often incorporated directly into the CPU chip or put on a separate chip with a separate bus link with the CPU.

Additional Information

  • DVD (digital video disc) is a technology based on optical data storage similar to compact disc (CD). Optical data storage is a method of storing digital information (1's and 0's) by using light to read the information.
  • Read-only memory is a type of non-volatile memory used in computers and other electronic devices.
    • Data stored in ROM cannot be modified electronically after the memory device is manufactured.
  • USB Pendrive is a Secondary type of storage device.​

    • The full form of USB is Universal Serial Bus.

Computer Knowledge - 9 - Question 4

Which of the following options displays the name of the web page in an Internet Explorer browser?

Detailed Solution for Computer Knowledge - 9 - Question 4

The correct option is (1)

The title bar displays the name of the web page in an Internet Explorer browser.

Key Points

  • A discontinued line of graphical web browsers created by Microsoft and included in the Windows range of operating systems is known as Internet Explorer.
  • The element that displays the current URL in a web browser is the address bar, often known as the location bar or URL bar.
  • You may alter a lot of things in Internet Explorer to personalize your browsing experience. Open Internet Explorer on your desktop and choose Tools > Internet options to examine all settings and options.

Additional Information

Title bar:- An icon and line of text specified by the application are displayed in the title bar at the top of a window.

Menu bar:- A GUI's menu labels are displayed on a thin, horizontal bar known as a menu bar.

Status bar:- A graphical control element called a status bar displays an information area at the bottom of windows.

Address bar:- The address bar is the well-known text area that displays the name or URL (uniform resource locator) of the currently-viewed web page at the top of a web browser's graphical user interface (GUI).

Computer Knowledge - 9 - Question 5

Which among the following is a database software?

Detailed Solution for Computer Knowledge - 9 - Question 5

The correct answer is dBase.

Key Points

  • What is a Database?
    • A database is a collection of related data which represents some aspect of the real world. A database system is designed to be built and populated with data for a certain task.
  • What is DBMS?
    • Database Management System (DBMS) is a software for storing and retrieving users' data while considering appropriate security measures. It consists of a group of programs that manipulate the database. The DBMS accepts the request for data from an application and instructs the operating system to provide the specific data. In large systems, a DBMS helps users and other third-party software to store and retrieve data.
    • DBMS allows users to create their own databases as per their requirements. The term “DBMS” includes the use of the database and other application programs. It provides an interface between the data and the software application.
    • Some DBMS examples include MySQL, PostgreSQL, Microsoft Access, SQL Server, FileMaker, Oracle, RDBMS, dBASE, Clipper, and FoxPro. Since there are so many database management systems available, it is important for there to be a way for them to communicate with each other. For this reason, most database software comes with an Open Database Connectivity (ODBC) driver that allows the database to integrate with other databases. For example, common SQL statements such as SELECT and INSERT are translated from a program's proprietary syntax into a syntax other databases can understand.
  • dBase is considered to be the 1st DBMS software for all types of microcomputer systems.
Computer Knowledge - 9 - Question 6

______ is the key circuit board holding the essential processing parts of a computer.

Detailed Solution for Computer Knowledge - 9 - Question 6

The correct answer is Motherboard.

Key Points

  • Motherboard: The motherboard is the main circuit board of a computer.
    • It houses the CPU, RAM, and other essential components.
    • It also provides the electrical connections by which the other components of the system communicate.

Additional Information

Computer Knowledge - 9 - Question 7

Which cyber security measure involves verifying the identity of users before granting access to a system or network?

Detailed Solution for Computer Knowledge - 9 - Question 7

The correct answer is Multi-factor authentication.

Key Points

  • Authentication protocols can go further than 2FA and use multiple factors to authenticate a person or system.
  • Authentication methods that use two or more factors are called multifactor authentication (MFA).
  • Authentication is the process of determining whether someone or something is who or what they say they are.
  • Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or a data authentication server.
  • There are several authentication types.
  • For user identity, users are typically identified with a user ID; authentication occurs when the user provides credentials, such as a password, that match their user ID.
  • The practice of requiring a user ID and password is known as single-factor authentication (SFA).
  • In recent years, organizations have strengthened authentication by asking for additional authentication factors.
  • These can be a unique code provided to a user over a mobile device when a sign-on is attempted or a biometric signature, such as a facial scan or thumbprint.
  • This is known as two-factor authentication (2FA).

Additional InformationFirewall configuration:

  • Firewall configuration is a crucial aspect of network security.
  • It involves adjusting the settings of a firewall to determine which data packets are allowed into a network and which ones are not.
  • This is done by manipulating factors such as domain names and Internet Protocol (IP) addresses to ensure optimal protection of a network.
  • A firewall can exist as a hardware device or software running on a third-party operating system.
  • Regardless of its form, it controls the flow of traffic across a network.

Regular software updates:

  • Regular software updates are fundamental to maintaining a smooth-running and secure software system.
  • These updates often include solutions to various issues that were present in the previous versions of the software, as well as offering improvements or additional features.
  • Software updates can include:

  • Bug Fixes:

    • Often updates include "bug fixes", or corrections for problems experienced in the software's performance.
    • An example of this would be a situation where an application crashes unexpectedly.
    • A software update could involve a bug fix that "improves the ability to switch apps, reducing unexpected software crashes".
  • Feature Enhancements: Some updates may come with improved features or new capabilities added to the software, which can enhance user experience.

  • Security Improvements:

    • In this evolving digital landscape, maintaining secure software is critical.
    • Regular updates often incorporate security patches or improvements to better protect against evolving cybersecurity threats.

Network encryption:

  • Network encryption is a crucial aspect of network security that helps safeguard information by converting understandable data into an unreadable format.
  • This conversion is done using an encryption algorithm and a randomly generated encryption key.
  • The scrambled data, known as ciphertext, is only readable when it's decrypted using the corresponding decryption key.
  • Purpose:
    • The primary purpose of network encryption is to ensure privacy and security.
    • Only the intended recipient or the rightful data owner can decipher encrypted communications or data, preventing parties such as attackers, ad networks, Internet service providers, and even governments from intercepting and reading the sensitive data.
    • This effectively protects user privacy.
  • Types of Network Encryption:
    • One of the encryption types is the Triple Data Encryption Standard (3DES), a version of the original DES encryption algorithm.
    • The 3DES encrypts data three times using three 64-bit keys, resulting in a key length of 192 bits.
    • Being a symmetric encryption, the encryption and decryption keys in 3DES are the same, and therefore, private.
    • Moreover, it encrypts data in 64-bit segments.
  • Importance:
    • Network encryption plays a crucial role in maintaining the confidentiality of data transported across networks.
    • It helps protect sensitive corporate and personal information during transmission, thus making a significant contribution to integrity and trust in digital communications.
Computer Knowledge - 9 - Question 8

The devices that work with computer systems as soon as they are connected are described as

Detailed Solution for Computer Knowledge - 9 - Question 8

The correct answer is Plug-N-Play.

Key Points

  • The devices that work with computer systems as soon as they are connected are described as "Plug and Play" devices.
    • Plug and Play (PnP) is a technology that allows computer systems to automatically recognize and configure new devices as they are connected.
    • Users can simply plug a device into their computer's USB or other ports, and the computer will automatically recognize the device and install the necessary drivers and software to use it.
    • PnP devices include a wide range of peripherals and hardware, such as printers, keyboards, mice, cameras, and external hard drives.

Additional Information

  • Hot Swapping is the process of replacing or adding hardware components to a computer system without the need to shut down or reboot the system.
    • This means that the device can be unplugged or removed while the system is still running, and a new device can be plugged in or installed without any interruption to the system.
  • Bay Swap refers to the process of swapping out hardware components that are stored in a removable bay or slot in a computer system.
  • USB Swapping refers to the process of swapping out USB devices that are connected to a computer system.
    • This often involves unplugging one USB device and plugging in a different USB device.
Computer Knowledge - 9 - Question 9

Personnel who design, program, operate and maintain computer equipment refers to _______ .

Detailed Solution for Computer Knowledge - 9 - Question 9

Personnel who design, program, operate and maintain computer equipment refers to Programmer.
Hence, Option D is correct.

Computer Knowledge - 9 - Question 10

Cursor is/are ______________.

Detailed Solution for Computer Knowledge - 9 - Question 10

Cursor is an indicator, Latin for runner and It is also used to store Database Table.
Hence, Option D is correct.

Computer Knowledge - 9 - Question 11

Which of the following can be used to acquire sensitive information from a device?

Detailed Solution for Computer Knowledge - 9 - Question 11

Phishing is a form of social engineering where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
Hence, option A is the correct answer.

Computer Knowledge - 9 - Question 12

Which of the following keyboard shortcut is used for double underlining the text in MS-Word?

Detailed Solution for Computer Knowledge - 9 - Question 12

Some shortcuts to be used in MS-Word are:

  • Alt + Ctrl + F = Insert footnotes
  • Ctrl + Shift + D = Apply double underline formatting
  • Ctrl + F = To open find dialog box
  • Ctrl + D = To open font dialog box

Hence, option B is the correct answer.

Computer Knowledge - 9 - Question 13

Which of the following is used by Windows to start the boot sequence?

Detailed Solution for Computer Knowledge - 9 - Question 13

Boot sequence is the order in which a computer searches for non-volatile data storage devices containing program code to load the operating system (OS).
Hence, option D is the correct answer.

Computer Knowledge - 9 - Question 14

A ________ is a command that returns the cursor to the next line and does not create a new paragraph in MS-Word.

Detailed Solution for Computer Knowledge - 9 - Question 14

A line break is a command or sequence of control characters that returns the cursor to the next line and does not create a new paragraph.
Essentially, line breaks denote the end of one line and the start of a new one.
Hence, option B is the correct answer.

Computer Knowledge - 9 - Question 15

In the context of computers, what is the full form of DFS?

Detailed Solution for Computer Knowledge - 9 - Question 15

In the context of computers, DFS stands for Depth-First Search.
It is a recursive algorithm that uses the backtracking principle. It entails conducting exhaustive searches of all nodes by moving forward if possible and backtracking, if necessary.
Hence, option B is the correct answer.

Computer Knowledge - 9 - Question 16

Which of the following network devices are used to regenerate signals when they travel over a longer distance?

Detailed Solution for Computer Knowledge - 9 - Question 16

A repeater in computer networks are powerful network devices that are used to regenerate signals when they travel over a longer distance, ensuring that the signal strength remains constant.
Hence, option A is the correct answer.

Computer Knowledge - 9 - Question 17

The input device used for selecting and drawing things on the screen is called ____

Detailed Solution for Computer Knowledge - 9 - Question 17

The correct answer is Light Pen.

Key Points

  • Light Pen -
    • It is an input device of the computer which serves to give commands to the computer.
    • It is also called an electronic pen.
    • It looks like an ordinary pen.
    • It is used as a mouse.

Additional Information

  • A wave of light emerges from the tip of this pen.
  • With this point, the icon made on the screen is touched and clicked.
  • This work is done in the same way that we click by moving the mouse pointer on the screen.
  • The tip of the light pen acts in a way like the Enter / Ok button.​
Computer Knowledge - 9 - Question 18

When a group of computers and devices are connected together, it is called ______.

Detailed Solution for Computer Knowledge - 9 - Question 18

The correct answer is Network.

Important Points

  • A network is a group of computers and devices are connected together through various means. The largest network in the world is the Internet.
  • The devices which are connected to a network are called Networking hardware. Networking hardware mediates data transmission in a computer network.
  • A Network interface card (NIC) is used in the computer systems which helps a computer to turn into part of a network.

Additional Information

  • A Central processing unit (CPU) is considered as the brain of the computer, all types of data processing operations are performed by CPU. It is generally composed of a control unit, main memory, and an arithmetic-logic unit.
  • A Branch is an instruction in a computer program that tells a computer to start executing different instructions, other than executing instructions in order.
  • A Modem is a hardware device that helps in converting data from a digital format. The modem allows a computer to connect to the Internet.
Computer Knowledge - 9 - Question 19

Which of the following is a software?

Detailed Solution for Computer Knowledge - 9 - Question 19

Operating system :

An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.

Examples: Microsoft Windows, Apple's macOS, DOS (Disk operating system), Chrome OS.

Important Points

Plotter:

  • A plotter is an output device.
  • A plotter is a computer hardware device that is used for printing vector graphics.
  • Plotters are much like a printer.
  • Plotters can produce high-quality output on large sheets.
  • Using plotters, users can draw the same pattern thousands of times without any image degradation.

Light pen:

  • Light Pens can be used as input coordinate positions by providing necessary arrangements.
  • If background color or intensity, a light pen can be used as a locator.
  • It is used as a standard pick device with many graphics system.
  • It can be used as stroke input devices.
  • It can be used as valuators.

Touch Screen:

  • A touch screen is a device that works both as an input and an output device.
  • The user using its application in mobile can view different options (output) and the user can also select different options (Input).
Computer Knowledge - 9 - Question 20

Which of the following is utility software?

Detailed Solution for Computer Knowledge - 9 - Question 20

The Utility Software is system software that helps to maintain the proper and smooth functioning of a Computer System. It assists the Operating System to manage, organizing, maintaining, and optimizing the functioning of the computer system.

Utility Software performs certain tasks like virus detection, installation, and uninstallation, data backup, deletion of unwanted files, etc. Some examples are antivirus software, file management tools, compression tools, disk management tools, etc.
WinRAR: WinRAR is a proprietary file compression and archiving utility developed and distributed by RARLAB. It is not built on an open-source digital platform and is a commercial software product

66 docs|140 tests
Information about Computer Knowledge - 9 Page
In this test you can find the Exam questions for Computer Knowledge - 9 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Knowledge - 9, EduRev gives you an ample number of Online tests for practice

Top Courses for SSC CGL

Download as PDF

Top Courses for SSC CGL