SSC CGL Exam  >  SSC CGL Tests  >  SSC CGL Tier II Mock Test Series 2024  >  Computer Knowledge - 3 - SSC CGL MCQ

Computer Knowledge - 3 - SSC CGL MCQ


Test Description

20 Questions MCQ Test SSC CGL Tier II Mock Test Series 2024 - Computer Knowledge - 3

Computer Knowledge - 3 for SSC CGL 2024 is part of SSC CGL Tier II Mock Test Series 2024 preparation. The Computer Knowledge - 3 questions and answers have been prepared according to the SSC CGL exam syllabus.The Computer Knowledge - 3 MCQs are made for SSC CGL 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Knowledge - 3 below.
Solutions of Computer Knowledge - 3 questions in English are available as part of our SSC CGL Tier II Mock Test Series 2024 for SSC CGL & Computer Knowledge - 3 solutions in Hindi for SSC CGL Tier II Mock Test Series 2024 course. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free. Attempt Computer Knowledge - 3 | 20 questions in 15 minutes | Mock test for SSC CGL preparation | Free important questions MCQ to study SSC CGL Tier II Mock Test Series 2024 for SSC CGL Exam | Download free PDF with solutions
Computer Knowledge - 3 - Question 1

Which type of protocol is a widely used standard protocol?

Detailed Solution for Computer Knowledge - 3 - Question 1

The correct answer is option 2.

Key Points

  • TCP/IP, which stands for Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. It's a widely used standard protocol that forms the basis of most internet connections, making it a critical component of the global internet infrastructure.
  • While SMTP (Simple Mail Transfer Protocol), UDP (User Datagram Protocol), and FTP (File Transfer Protocol) are also widely used protocols, they are typically used for more specific tasks (like email transmission or file transfer), and they all function within the larger framework of the TCP/IP protocol suite.

Additional Information

  • UDP (User Datagram Protocol): It is a protocol that is used for sending packets of data over the internet. It is often used for streaming media and online gaming.
  • FTP (File Transfer Protocol): It is a protocol that is used for transferring files over the internet. It is often used by web developers to upload files to a web server
Computer Knowledge - 3 - Question 2

What are the startup routines that execute when a machine is turned on?

Detailed Solution for Computer Knowledge - 3 - Question 2

The correct answer is option 3.

Key Points

  • When a machine is turned on, the startup routines that execute are collectively known as the boot process.
  • The BOOT up is refers to the process of loading the operating system into memory and preparing it for use.

Additional Information

  • I/O operation: It refers to input/output operations that occur during the boot process, such as detecting connected devices and initializing their drivers.
  • POST (Power-On Self-Test): It is a diagnostic process that occurs during the boot process to check the hardware components of the machine and ensure they are functioning properly.
  • Operating outline: It is not a commonly used term in reference to the boot process. It is possible that it refers to the process of loading the system's configuration and settings, but this is typically included in the overall boot process.
1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Knowledge - 3 - Question 3

Which of the following are not applications of the Internet?

Detailed Solution for Computer Knowledge - 3 - Question 3

The correct answer is None of the above.

Key Points

  • The World Wide Web (WWW) is an application of the Internet that provides access to information over the Internet.
  • Electronic mail (email) is a method of exchanging digital messages over the Internet.
  • Voice Over Internet Protocol (VoIP) is a technology that allows for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
  • Therefore, all the options listed are applications of the Internet.

Additional Information

  • The Internet has numerous applications, including file transfer, remote access, forums, social media platforms, streaming services, and more.
  • These applications have revolutionized the way we communicate, work, and access information.
Computer Knowledge - 3 - Question 4

______ is a technology that allows computers and other devices to communicate via a wireless signal.

Detailed Solution for Computer Knowledge - 3 - Question 4

The correct answer is Wi-Fi.

Key Points

  • WiFi:
    • It is suggested that wifi stands for Wireless Fidelity.
    • It is a wireless communication technology which enables computers and other devices to communicate through a wireless signal.
    • Wifi technology has coverage areas of up to 300 feet (approx.. 100 meters).
    • This means it can be used for larger distance compared to Bluetooth technology.

Additional Information

  • Electronic gadgets enable people to communicate with each other irrespective of their geographic location and distance.
  • All technologies can be broadly classified into – wired and Wireless.
  • Wired technologies use cables whereas wireless technologies use radio frequency to enable one or more devices to communicate without any physical connections.
  • Bluetooth:
    • Bluetooth technology was created by a telecom company called Ericsson in 1994.
    • It is a wireless medium for sharing information built into electronic devices like mobile phones, Personal Digital Assistants (PDAs) etc.
    • There is no cable or modem or driver to be installed.
    • It can work in a concise range for example only within the room.
    • It a short-range wireless convergent technology.
    • It is a low-power radio technology covering a small range of distances up to 10 metres or 30 feet approx.
    • This technology has been adopted to many products such as earphones, in-car systems, printer, keyboard, and mouse.
  • Infrared:
    • It is another wireless technology that uses infrared radiation for wireless transmission between computer devices as well as many handheld remotes for TVs and video and stereo equipment.
    • Infrared adapters are installed on many laptops and smartphones.
  • Modem:
    • Modems can be wired or wireless.
    • It converts the digital signal from the computer into an analogue signal that can travel through the telephone line.
    • On the other end, this analogue signal is again converted back to digital form by the modem at the destination end.
Computer Knowledge - 3 - Question 5

Which of the following is a magnetic disk?

Detailed Solution for Computer Knowledge - 3 - Question 5

The answer is Winchester.

Key Points

  • A Winchester disk is a type of hard disk drive that uses a rotating magnetic disk to store data.
  • Winchester disks are the most common type of hard disk drive in use today.
  • They are typically used in personal computers, servers, and other devices that require large amounts of storage space.
  • DVDs, CD-RWs, and CD-Rs are all optical disks that use a laser to store data.
    • They are not magnetic disks.

Additional Information

Computer Knowledge - 3 - Question 6

In Gmail, what do you use when you receive mail and want to send the mail in response to the same mail and to the original sender only?

Detailed Solution for Computer Knowledge - 3 - Question 6

You should use the option "Reply" when you receive an email in Gmail and want to send a response to the original sender only.

Explanation:

  • "Reply" is the option you should choose when you want to respond to the original sender of an email only.
  • When you click "Reply", Gmail will automatically populate the "To" field with the email address of the person who sent you the email.
  • You can then type your response and send it directly to that person.

Additional Information

  • "Forward" is used to send an email to someone who was not originally included in the email thread. When you forward an email, you can add new recipients, modify the subject line or add additional comments.
  • "Both Reply and Forward" is not an option in Gmail. However, you can reply to an email and then forward that reply to someone else.
  • "Reply All" is used when you want to send a response to the original sender and all the other recipients of the original email. Use this option only when you want everyone on the email thread to see your response.
Computer Knowledge - 3 - Question 7

Which one of the following registers is used to keep track of the next instruction to be executed?

Detailed Solution for Computer Knowledge - 3 - Question 7

The correct answer is Program counter.

Key Points

  • The register used to keep track of the next instruction to be executed is called a "program counter" (PC) or "instruction pointer" (IP).
    • It is a special-purpose register in a computer's central processing unit (CPU) that holds the memory address of the next instruction to be executed in a program.
    • PC is automatically incremented to indicate the next instruction after each instruction is executed, allowing the CPU to retrieve and execute instructions sequentially.

Additional Information

  • In a computer, a memory address register (MAR) is a CPU register that stores either the memory address from which data will be fetched in CPU registers or the address at which data will be sent and stored via the system bus.
  • A memory buffer register is a register in a computer's CPU that transfers data to and from immediate access storage. It contains a copy of the value in the memory location specified by the memory address register.
  • A memory buffer register is a register in a computer's CPU that transfers data to and from immediate access storage.
Computer Knowledge - 3 - Question 8

The 'Ctrl + W' keyboard shortcut is used for which of the following purposes in MS-Word 365?

Detailed Solution for Computer Knowledge - 3 - Question 8

The correct answer is To close a document

Key Points

  • The 'Ctrl + W' keyboard shortcut in Microsoft Office Suite, including Word 365, is commonly used to close the current window or document. It's a convenient keyboard shortcut because it saves you having to navigate to the File menu and click 'Close'.
  • Once you press 'Ctrl + W', if any changes were made to the document that haven't been saved, Word will prompt you to save changes before closing. So, it's a safe command to use without worrying about losing unsaved work.
  • Please note that it doesn't shut down the Word application entirely, it only closes the current active document. If you have multiple documents open, you'll need to use the command for each one you want to close.

Additional Information

  • Ctrl + S: Save the document. If it's not yet saved anywhere, it will prompt you to choose a location and name.
  • Ctrl + O: Open a document.
  • Ctrl + N: Create a new document.
  • Ctrl + P: Print the document.
  • Ctrl + Z: Undo an action.
  • Ctrl + Y: Redo an action.
  • Ctrl + X: Cut the selected content to the Clipboard.
  • Ctrl + C: Copy the selected content to the Clipboard.
  • Ctrl + V: Paste the contents of the Clipboard.
  • Ctrl + A: Select all content in the document.
  • Ctrl + B: Bold the selected text.
  • Ctrl + I: Italicize the selected text.
  • Ctrl + U: Underline the selected text.
  • Ctrl + F: Open the Find dialog box.
  • Ctrl + H: Open the Find and Replace dialog box.
  • Ctrl + E: Center align the text.
  • Ctrl + L: Left align the text.
  • Ctrl + R: Right align the text.
  • Ctrl + J: Justify the text.
  • F12: Save the document as a new file.
Computer Knowledge - 3 - Question 9

Which among the following are the two types of computer memory?

Detailed Solution for Computer Knowledge - 3 - Question 9

RAM and ROM are the two types of computer memory. Read-only memory is a type of non-volatile memory used in computers and other electronic devices. Data stored in ROM cannot be electronically modified after the manufacture of the memory device.
Hence, Option C is correct.

Computer Knowledge - 3 - Question 10

To select a column the easiest method is ______________ .

Detailed Solution for Computer Knowledge - 3 - Question 10

To select a column the easiest method is click the column heading.
Hence, Option D is correct.

Computer Knowledge - 3 - Question 11

Which of the following device is used for generating hard copies of a document?

Detailed Solution for Computer Knowledge - 3 - Question 11

A printer is a hardware output device which is used for generating hard copies and print of a document.
Hence, option B is the correct answer.

Computer Knowledge - 3 - Question 12

What is a reserved portion of a hard disk that is used as an extension of random-access memory (RAM)?

Detailed Solution for Computer Knowledge - 3 - Question 12

In storage, a pagefile is a reserved portion of a hard disk that is used as an extension of random-access memory (RAM) for data in RAM that hasn't been used recently.
Hence, option C is the correct answer.

Computer Knowledge - 3 - Question 13

What do we call a short block of code which takes in parameters and returns a value?

Detailed Solution for Computer Knowledge - 3 - Question 13

A lambda expression is a short block of code which takes in parameters and returns a value.
They are similar to methods, but they do not need a name and they can be implemented right in the body of a method.
Hence, option D is the correct answer.

Computer Knowledge - 3 - Question 14

Which of the following term is used for both the data storing and transmitting devices?

Detailed Solution for Computer Knowledge - 3 - Question 14

In the context of informatics, media means both the devices used to store data (hard drives, CD-ROMs, diskettes, etc.) as well the ones used to transmit it (cables, wires), or even propagate it in its many forms (videos, sounds, podcasts, etc.).
Hence, option D is the correct answer.

Computer Knowledge - 3 - Question 15

Which of the following key is used to create a relationship between two tables in DBMS?

Detailed Solution for Computer Knowledge - 3 - Question 15

Foreign Key is a column that creates a relationship between two tables.
The purpose of Foreign keys is to maintain data integrity and allow navigation between two different instances of an entity.
Hence, option B is the correct answer.

Computer Knowledge - 3 - Question 16

For which type of cell reference in MS-Excel a ‘$’ symbol is used?

Detailed Solution for Computer Knowledge - 3 - Question 16

In Excel, an absolute reference is a cell reference in which the column and row coordinates stay constant while copying a formula from one cell to the other.
A dollar symbol ($) is used before the coordinates to correct them. For instance, $D$2 is an absolute reference to cell D2.
Hence, option C is the correct answer.

Computer Knowledge - 3 - Question 17

Which virus makes changes to a disk's file system?

Detailed Solution for Computer Knowledge - 3 - Question 17

The correct answer is Cluster virus.

Key Points

  • A cluster virus is a type of virus that ties its own execution to the execution of various software programs.
  • These viruses typically work by changing directory or registry entries so that when someone starts a program, the virus will start as well.
  • It looks like every program on a disk is infected with the virus, when in fact, only one copy of the virus exists.
  • An example is a Dir-2 virus.

Additional Information

  • Stealth virus-
    • A computer virus that actively hides from antivirus software by either masking the size of the file that it hides in or temporarily removing itself from the infected file and placing a copy of itself in another location on the drive, replacing the infected file with an uninfected one that it has stored on the hard drive.

  • Macro virus-

    • A macro virus is a computer virus written in the same macro language that is used for software applications, such as word processing programs
    • Microsoft Word and Excel are two examples of applications that feature powerful macro languages. The virus is embedded in these applications. This allows them to run automatically when the documents are open.
    • When an infected file is opened, the macro virus releases a sequence of actions that begin automatically. These actions cause damage to the computer and its applications.
  • Polymorphic viruses-

    • Polymorphic viruses are complex file infectors that can create modified versions of themselves to avoid detection yet retain the same basic routines after every infection.

Computer Knowledge - 3 - Question 18

A ________ is a continuous memory without any addressing and stores data serially.

Detailed Solution for Computer Knowledge - 3 - Question 18

The correct answer is magnetic tape.

Key Points

  • In computing, sequential access memory (SAM) is a class of data storage devices that read stored data in a sequence.
    • A magnetic tape is a sequential access memory storage device.
    • Under SAM, the memory is accessed in a specific linear sequential manner, like accessing in a single Linked List.
    • The access time depends on the location of the data.

Additional Information

  • Cache memory
    • ​It acts as a temporary storage area that the computer's processor can retrieve data from easily.
    • It is a chip-based computer component that makes retrieving data from the computer's memory more efficient.
  • DVD
    • ​It is short of digital versatile disc or digital video disc.
    • It is a disc capable of storing a significant amount more data than a standard compact disc.
    • These are widely used for storing and viewing movies and other data.
  • Blu-ray disk
    • ​It is a digital optical disc storage format.
    • It is most often used for playback of high-definition (HD) video.
    • It represents the third generation of compact disc (CD) technology, after audio CDs and digital video discs (DVDs).
Computer Knowledge - 3 - Question 19
The actual timing signals that govern the transfer of data between input unit, processor, memory and output units are generated by the ________ and the ______ stores the processed data.
Detailed Solution for Computer Knowledge - 3 - Question 19

The actual timing signals that govern the transfer of data between input unit, processor, memory and output units are generated by the Control Unit (CU) and the Memory Unit stores the processed data.

Control Unit (CU):

  • This component of a computer's central processing unit (CPU) directs the operation of the computer.
  • It manages and coordinates the hardware of the computer.
  • The control unit directs the flow of data between the CPU and other devices, it fetches, decodes, and executes instructions from memory, and employs timing signals to control the other units.

Memory Unit:

  • This is where the computer stores data.
  • After the data has been processed by the CPU, the Control Unit will guide the storage of this processed data back into memory units, such as RAM, or if the data needs to be stored long term, into secondary storage like a hard-drive or SSD.
Computer Knowledge - 3 - Question 20

What does the ‘Print Range’ option allow you to specify when printing slides in PowerPoint?

Detailed Solution for Computer Knowledge - 3 - Question 20

The correct answer is The range of slides to be printed.

Key Points

  • Print range options allow us to choose the specific pages or range of pages to be printed.
  • We can follow the below process to print a PowerPoint slide.
    • Open the PowerPoint presentation you want to print.
    • Go to "File" located in the menu bar.
    • Click on "Print".
    • Choose your desired printer by selecting it under the "Printer" section.
    • Under the "Print All Slides" option, choose if you want to print all slides, selected slides, or current slides.
    • If needed, in the "Slides" box, type which slide numbers to print, separated by commas.
    • After the settings are finalized, click "Print" to start the printing process.

Additional Information

  • The leading creators of Microsoft PowerPoint are Robert Gaskins and Dennis Austin, launched in 1987 under Microsoft Corporation.
  • Microsoft PowerPoint is a presentation program which means that a user can rewrite, erase, or modify a document as per the requirement.
66 docs|139 tests
Information about Computer Knowledge - 3 Page
In this test you can find the Exam questions for Computer Knowledge - 3 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Knowledge - 3, EduRev gives you an ample number of Online tests for practice

Top Courses for SSC CGL

Download as PDF

Top Courses for SSC CGL