SSC CGL Exam  >  SSC CGL Tests  >  SSC CGL Tier II Mock Test Series 2024  >  Computer Knowledge - 4 - SSC CGL MCQ

Computer Knowledge - 4 - SSC CGL MCQ


Test Description

20 Questions MCQ Test SSC CGL Tier II Mock Test Series 2024 - Computer Knowledge - 4

Computer Knowledge - 4 for SSC CGL 2024 is part of SSC CGL Tier II Mock Test Series 2024 preparation. The Computer Knowledge - 4 questions and answers have been prepared according to the SSC CGL exam syllabus.The Computer Knowledge - 4 MCQs are made for SSC CGL 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Knowledge - 4 below.
Solutions of Computer Knowledge - 4 questions in English are available as part of our SSC CGL Tier II Mock Test Series 2024 for SSC CGL & Computer Knowledge - 4 solutions in Hindi for SSC CGL Tier II Mock Test Series 2024 course. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free. Attempt Computer Knowledge - 4 | 20 questions in 15 minutes | Mock test for SSC CGL preparation | Free important questions MCQ to study SSC CGL Tier II Mock Test Series 2024 for SSC CGL Exam | Download free PDF with solutions
Computer Knowledge - 4 - Question 1

What is the function of control lines in RAM?

Detailed Solution for Computer Knowledge - 4 - Question 1

The correct answer is option 4.

Key Points

  • Control lines in RAM hold data that is being transferred to or from memory, acting as a buffer between the CPU and RAM.
  • These lines help regulate the flow of data, ensuring that the CPU and RAM are not overwhelmed with too much information at once.

Additional Information

  • Connects RAM and Difficult Disks: It is incorrect as control lines are not responsible for connecting RAM and hard disks.
  • Connect CPU and RAM: It is also incorrect as this is the role of the address and data lines, not the control lines.
  • Erase data that is being transferred to or from memory: It is incorrect as the control lines do not erase data, but rather hold it temporarily.
Computer Knowledge - 4 - Question 2

In terms of computers, the set of ways in which an adversary can enter a system and can potentially cause damage is called:

Detailed Solution for Computer Knowledge - 4 - Question 2

The correct answer is Attack Surface.

Key Points

  • The attack surface:
    • It is the number of all possible points, or attack vectors, where an unauthorized user can access a system and extract data.
    • The smaller the attack surface, the easier it is to protect.
    • Organizations must constantly monitor their attack surface to identify and block potential threats as quickly as possible.
    • They also must try and minimize the attack surface area to reduce the risk of cyberattacks succeeding.
    • However, doing so becomes difficult as they expand their digital footprint and embrace new technologies.
    • The attack surface is split into two categories: the digital and physical.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Knowledge - 4 - Question 3

Which of the following symbols is used to make the absolute address of a cell in MS-Excel?

Detailed Solution for Computer Knowledge - 4 - Question 3

The correct answer is $.

Key Points

  • The cell reference or cell address in MS Excel helps to identify the cell. Now, when a cell reference gets fixed and cannot change due to copy, then it is referred to as an absolute cell reference in MS Excel.
  • In MS Excel, rows are named after numbers like 1, 2, 3, 4 etc. and the columns are named with capital letters A, B, C etc. Once it reaches the letter Z, the next column starts with 'AA'.
  • To create an absolute cell reference, the user needs to add the '$' sign at the beginning of the name of the row and column.
  • For example, the absolute cell reference of A1 will be $A$1.

Additional Information

  • MS Excel, a spreadsheet program, is widely used for different kinds of functions, as a result, the info is simple to avoid wasting time, and data is accessible and removed with zero discomforts and less labour.
  • The cell reference of the very first cell of MS Excel is A1.
Computer Knowledge - 4 - Question 4

Select the option that correctly matches the elements of the below lists.

Detailed Solution for Computer Knowledge - 4 - Question 4

The correct answer is I - B, II - A, III - C.

Key Points

Bit (binary digit) 0 and 1 represent the on and off state of the electrical circuit respectively.

Additional Information

Computer Knowledge - 4 - Question 5

Which of the following font effects is not available in the MS-Word 2010 font dialog box?

Detailed Solution for Computer Knowledge - 4 - Question 5

The font effect that is not available in the MS-Word 2010 font dialog box is "Equalize Character Height".

  • Equalize Character Height: This option is not available in the MS-Word 2010 font dialog box, but in general, it would be used to adjust the size of characters so that they are all the same height.
  • This can be useful for creating a consistent look across text that uses different fonts or styles.
  • However, as noted, this option is not available in MS-Word 2010, so it cannot be used in that program.

Additional Information

  • Superscript: This option is used to format text so that it appears above the regular text line and slightly smaller.
  • It is commonly used for mathematical and scientific formulas, as well as for footnotes.
  • Small Caps: This option formats the selected text in a way that makes all the letters uppercase, but with the lowercase letters being smaller than the uppercase letters.
  • This option is useful for creating headings and titles that stand out without being too obtrusive.
  • Double Strikethrough: This option adds a double line through the selected text, creating a strikethrough effect that is thicker than the single strikethrough option.
  • It is often used to indicate that text has been completely deleted or to emphasize that something is not applicable.
Computer Knowledge - 4 - Question 6
Which among the following statements is incorrect?
Detailed Solution for Computer Knowledge - 4 - Question 6

Magnetic Tape

Magnetic tape data storage is a system for storing digital information on magnetic tape using digital recording.

A magnetic tape consists of vertical columns called frames.
This statement is incorrect.

  • Typically, magnetic tapes consist of a long, thin plastic strip coated with a magnetic material.
  • The data is stored horizontally across the tape in a series of parallel tracks or channels.
  • Each track or channel is subdivided into a series of frames or data-packed blocks.

Magnetic tape consists of horizontal rows called channels or tracks.
This statement is correct.

  • A magnetic tape is divided into a series of tracks or channels, which are horizontal rows.
  • Each track or channel contains a series of data-containing frames or blocks.

Magnetic tape drivers are not suitable for storage of data that need to be accessed randomly.
This statement is also correct.

  • Magnetic tape drives are sequential access devices, meaning that data is accessed sequentially from the beginning to the conclusion of the tape.
  • This renders them unsuitable for storing data that requires random access, such as in a database.

There is no addressing in the magnetic tapes.
This statement is also correct.

  • Typically, magnetic tapes are organized as a series of blocks or frames containing data, but there is no addressing mechanism that allows specific data to be quickly located.
  • Instead, data must be sequentially read or written from the beginning to the end of the tape.

Hence, the correct answer is option 1.

Computer Knowledge - 4 - Question 7

Which one of the following memories is extremely fast and acts as a high-speed buffer between the CPU and the main memory?

Detailed Solution for Computer Knowledge - 4 - Question 7

The correct answer is Cache Memory.

Key Points

  • The memory that is extremely fast and acts as a high-speed buffer between the CPU and the main memory is called Cache Memory.
    • Cache memory is a small, high-speed memory that stores frequently accessed data and instructions to reduce the average time to access data from the main memory.
    • The CPU can access the cache memory much faster than the main memory, as it is located on the same chip as the CPU or very close to it.

Additional Information

  • RAM is a volatile memory that stores data and instructions that are currently being used by the CPU.
    • It is used for the temporary storage of data and is cleared when the computer is shut down.
    • RAM is much faster than secondary storage devices like hard drives and solid state drives, but its capacity is limited and it is more expensive.
  • ROM is a non-volatile memory that stores permanent data and instructions that cannot be changed or erased.
    • It is used to store firmware and other essential programs that are required to start up the computer system.
  • Flash Memory is a non-volatile memory that can be erased and rewritten multiple times.
    • It is used in devices like USB drives, memory cards, and solid-state drives to store data and applications.
    • Flash memory has a longer lifespan and is more durable than traditional hard drives, making it ideal for use in portable devices.
Computer Knowledge - 4 - Question 8

Which one of the following is not a language translator?

Detailed Solution for Computer Knowledge - 4 - Question 8

The correct answer is Linker.

Key Points

  • A linker is a computer program that takes one or more object files generated by a compiler and combines them into an executable program.
    • The linker resolves references between different modules or libraries and produces a final executable file that can be loaded and executed by the operating system.

Additional Information

  • Language translators are software programs that convert code written in one programming language into another form that can be executed by a computer. There are three main types of language translators:
    • Compilers - which translate high-level code into machine code, which can be directly executed by a computer's processor.
    • Interpreters - which translate code on-the-fly as it is executed, rather than generating an executable file like a compiler.
    • Assemblers - which translate assembly language code into machine code.
Computer Knowledge - 4 - Question 9

Formatting a disk results in all the data being?

Detailed Solution for Computer Knowledge - 4 - Question 9

Formatting a disk results in all the data being Deleted from the disk.
Hence, Option C is correct.

Computer Knowledge - 4 - Question 10

In case of MS-access, the rows of table corresponds to ______________ .

Detailed Solution for Computer Knowledge - 4 - Question 10

In MS-access the row of table corresponds to Record. Each row in a table is called a record. All of the data in a table should refer to the same subject.
Hence, Option C is correct.

Computer Knowledge - 4 - Question 11

Which of the following is both a system as well as application software?

Detailed Solution for Computer Knowledge - 4 - Question 11

Among the given options, Internet Explorer is both a system as well as application software.
Internet Explorer has been designed to view a broad range of web pages and provide certain features within the operating system, including Microsoft Update.
Hence, option B is the correct answer.

Computer Knowledge - 4 - Question 12

Which of the following extension is used to save a spreadsheet created by MS-Excel?

Detailed Solution for Computer Knowledge - 4 - Question 12

.xlsx is used as an extension to save a spreadsheet created by MS-Excel.
Extensions tell your computer which application created or can open the file and which icon to use for the file.
Hence, option D is the correct answer.

Computer Knowledge - 4 - Question 13

Which of the following is another name for a monitor of computer?

Detailed Solution for Computer Knowledge - 4 - Question 13

A monitor in a computer can also be called as a VDU or Visual Display Unit. Others are types of a monitor.
It is the main output device of a computer. It forms images from tiny dots, called pixels that are arranged in a rectangular form.
Hence, option A is the correct answer.

Computer Knowledge - 4 - Question 14

A plotter is a type of ________________.

Detailed Solution for Computer Knowledge - 4 - Question 14

A plotter is a printer that interprets commands from a computer to make line drawings on paper with one or more automated pens.
Unlike a regular printer, a plotter can draw continuous point-to-point lines directly from vector graphic files or commands.
Hence, option D is the correct answer.

Computer Knowledge - 4 - Question 15

Which of the following key has two or more attributes that allow you to uniquely recognize a specific record in DBMS?

Detailed Solution for Computer Knowledge - 4 - Question 15

Compound Key has two or more attributes that allow you to uniquely recognize a specific record.
It is possible that each column may not be unique by itself within the database.
Hence, option C is the correct answer.

Computer Knowledge - 4 - Question 16

Which of the following is the biggest board in a computer chassis?

Detailed Solution for Computer Knowledge - 4 - Question 16

The motherboard is a printed circuit board and foundation of a computer that is the biggest board in a computer chassis.
It allocates power and allows communication to and between the CPU, RAM, and all other computer hardware components.
Hence, option B is the correct answer.

Computer Knowledge - 4 - Question 17

Which of the following is not an e-commerce website?

Detailed Solution for Computer Knowledge - 4 - Question 17

The correct answer is Google Maps.

Key Points

  • Among the options, the only google map is NOT an e-commerce website.
  • Google Maps is a web mapping service developed by google for route planning for traveling by foot, car, bicycle, air (in beta), and public transportation.
  • The word e-commerce stands for electronic commerce or internet commerce
    • The main purpose of an e-commerce website is to buying and selling of goods or services using the internet.
    • It also supports the transfer of money to execute these transactions.
    • It is one of the most popular ways for consumers to buy goods and services.
    • The first business-to-business online shopping system was Thomson Holidays.
  • Examples of e-commerce websites are:
    • Flipkart.
    • Amazon.
    • Uber.
    • Swiggy.
    • eBay.
    • Walmart.
    • Ola.
Computer Knowledge - 4 - Question 18

Which virus infects the important files of MS word?

Detailed Solution for Computer Knowledge - 4 - Question 18

The correct answer is a Macro Virus.

Key Points

  • A virus is a program that can infect other programs by modifying them to include a possibly evolved copy of itself.

Additional Information

Some of the common types of viruses are:

  • Boot Sector Virus: A boot sector virus displaces the boot record and copies itself to the boot sector i.e. where the program to boot the machine is stored.
  • File Virus: A file virus generally attacks executable files.
  • Macro Virus: The virus infects an important file of MS word. As soon as the application is opened the virus gets activated. It damages the formatting of documents and may not even allow the editing or saving of documents
  • Trojan Horse: It is a code hidden in games or spreadsheets. Its main objective is to cause harm to the data. They can create a bad sector on the disk, destroy file allocation tables, and cause the system to hang.
  • Worm: It is a program capable of replicating itself on a computer network. It travels from one computer to another across communication links. They generally disrupt routine services.
Computer Knowledge - 4 - Question 19

Which field should be used when you want to send a copy of an email to someone else without the original recipient knowing?

Detailed Solution for Computer Knowledge - 4 - Question 19

The correct answer is BCC.

Key Points

  • The BCC field stands for "Blind Carbon Copy".
  • This field is used when the sender wants to send a copy of an email to other recipients without the main recipients knowing.
  • This is often used for privacy purposes or when sending large-scale emails where it's more professional to keep each individual's email address private.

Additional Information

  • CC:
    • One can use the CC field (Carbon Copy) to send an email to additional recipients besides the primary recipient.
    • However, all recipients will be able to see who else has received the email.
    • Typically, one uses CC when all the recipients are equally relevant to the conversation, but no direct action is required from those in the CC field.
  • To:
    • This field is for the primary recipient(s).
    • They are the main intended readers and usually are the people from whom the sender expects some action or response.
    • Multiple recipients can be added to this field, usually separated by semicolons.
  • From:
    • This field is used to identify the sender of the e-mail.
    • This field should contain the e-mail address of the person or entity sending the e-mail.
    • It is automatically filled when a person sends an email from their account.
Computer Knowledge - 4 - Question 20

What is the primary objective of cybersecurity?

Detailed Solution for Computer Knowledge - 4 - Question 20

The correct answer is To prevent unauthorised access and data breaches.

Key Points

Cyber Security:

  • Cyber security is the application of technologies, processes and controls to protect networks, programs, systems, devices and data from cyber-attacks.
  • The aim is to reduce the risk of reduction of vulnerabilities, protect against the unauthorised exploitation of systems, networks and technologies and provide Incident Response and Recovery policy.

Indian Computer Emergency Response Team:

  • ICERT was formed with the aim to secure Indian cyberspace.
  • It provides Incident Prevention and Response Services and Security Quality Management Services.
  • It is designated under Section 70B of the Information Technology (Amendment) Act 2008 to serve as the national agency to perform the following functions in the area of cybersecurity:
    • Collection, analysis, and dissemination of information on cyber incidents.
    • Forecast and alerts of cybersecurity incidents.
    • Emergency measures for handling cybersecurity incidents
    • Coordination of cyber incident response activities.
66 docs|139 tests
Information about Computer Knowledge - 4 Page
In this test you can find the Exam questions for Computer Knowledge - 4 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Knowledge - 4, EduRev gives you an ample number of Online tests for practice

Top Courses for SSC CGL

Download as PDF

Top Courses for SSC CGL