SSC CGL Exam  >  SSC CGL Tests  >  Computer Knowledge - 7 - SSC CGL MCQ

Computer Knowledge - 7 - SSC CGL MCQ


Test Description

20 Questions MCQ Test - Computer Knowledge - 7

Computer Knowledge - 7 for SSC CGL 2024 is part of SSC CGL preparation. The Computer Knowledge - 7 questions and answers have been prepared according to the SSC CGL exam syllabus.The Computer Knowledge - 7 MCQs are made for SSC CGL 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Knowledge - 7 below.
Solutions of Computer Knowledge - 7 questions in English are available as part of our course for SSC CGL & Computer Knowledge - 7 solutions in Hindi for SSC CGL course. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free. Attempt Computer Knowledge - 7 | 20 questions in 15 minutes | Mock test for SSC CGL preparation | Free important questions MCQ to study for SSC CGL Exam | Download free PDF with solutions
Computer Knowledge - 7 - Question 1

Which of the following options performs the function of buffering and spooling?

Detailed Solution for Computer Knowledge - 7 - Question 1

The correct answer is option 2.

Key Points

  • Device Management performs the function of buffering and spooling in a computer system.
  • Buffering refers to temporarily holding data in a buffer or cache to improve system performance and reduce delays.
  • Spooling, on the other hand, involves storing data temporarily in a queue or spooling area until it can be processed by a device.

Additional Information

  • File Management: It involves organizing and managing files and directories on a computer system.
  • Processor Management: It involves managing the CPU and allocating resources to different processes.
  • Memory Management: It involves managing and allocating memory resources to different processes and applications.
Computer Knowledge - 7 - Question 2

Which among the following generations of Computer used vacuum tubes?

Detailed Solution for Computer Knowledge - 7 - Question 2

The correct answer is First Generation.

Key Points

  • The computer has evolved from a large-sized simple calculating machine to a much smaller machine capable of multiple functionalities.
  • Each generation of computer is designed based on the hardware technology used leading to better, cheaper and powerful computers that are faster and efficient than their predecessors.

Hence, it can be concluded from the table that vacuum tubes were used by the first generation computers.

1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Knowledge - 7 - Question 3

When sending email, we place the email address of the primary recipient(s) of the email in the _______ field.

Detailed Solution for Computer Knowledge - 7 - Question 3

The correct option is (2)

TO

Key Points

  • Using the TO Field: Under email etiquette, the TO field should contain the email's primary recipient(s). This field needs to contain the recipients who must respond to the email in order for it to be more accurate.
  • Add the recipients to the "To" field. Moreover, you can add recipients: in both the "Cc" and "Bcc" fields. When writing a message, including the contact's name in the text field along with the "+" or "@mention" symbol.
  • The "To" field is the recipient field that is the easiest to understand. It's intended for your email's primary recipients. These recipients should be the primary focus of your message.

Additional Information

  • The Bcc (blind carbon copy) box in an email message allows you to send a duplicate of the message to a specific recipient while hiding their name from other recipients.
  • The Bcc box will show up whenever you create a message from the time you turn it on until you turn it off.
  • A copy of the email you are sending will also be sent to the email address you enter in the "carbon copy" or "CC" field.
  • The first line of text recipients sees when they open your email is the subject line.
Computer Knowledge - 7 - Question 4

An unauthorised access to a computer is a crime of _____ .

Detailed Solution for Computer Knowledge - 7 - Question 4

The correct answer is Hacking.Key Points

  • Hacking -
    • It is a process of exploiting vulnerabilities in a network or system. In which to gain unauthorized access to the system to carry out malicious activities.
    • This includes stealing information, damaging the system or deleting system files.
    • Ethical hacking, on the other hand, is a legal practice and professionals are hired by companies to help pinpoint weaknesses in a network and make it secure.
    • Ethical hacking is a practice to prevent attacks that can harm a company or individual.

Additional Information

  • ​Firewall -
    • It is a part of a computer system or network.
    • It is constructed to prevent unauthorized access and allow authorized communication.
  • A Patch -
    • It is a set of changes to a computer program or its supporting data.
    • It is designed to update, fix, or improve it.
    • This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes.
  • Data Encryption -
    • It helps in changing the data differently, or in changing the code.
    • So that it helps us to read a secret key or password.
    • We also call encrypted data as cipher text while unencrypted data we call plain text.
Computer Knowledge - 7 - Question 5

What will the function given below return in MS-Excel 2010?

=MATCH (12, {10,13, 30, 40, 60},1)

Detailed Solution for Computer Knowledge - 7 - Question 5

MATCH function

  • The MATCH function in Excel is used to locate a specific item within a range of cells. In this case, the function is looking for the position of the number 12 in the array ten, thirteen, thirty, forty, and sixty.
  • The MATCH function has the following syntax: =MATCH (lookup value, lookup array, [match type], lookup value).
  • So, =MATCH (12, {10,13, 30, 40, 60},1) will return 1.
  • Here, the lookup value in this case is 12, and the lookup array is 10, 13, 30, 40, 60. The match type is set to 1, which means that the function will search the lookup array for the largest value that is less than or equal to the lookup value. Because the number 12 is less than the array's first value (10), the function returns the position of the array's first number, which is 1.
Computer Knowledge - 7 - Question 6
Which among the following is not a magnetic storage?
Detailed Solution for Computer Knowledge - 7 - Question 6
  • Winchester disk: A Winchester disk, also known as a hard disk drive, is a magnetic storage device that stores and retrieves digital information using rapidly rotating disks coated with magnetic material.
  • Floppy Drive: A floppy disk drive is a magnetic storage device that uses a flexible, removable disk coated with magnetic material to store and retrieve digital information.
  • Memory Card: A memory card is a solid-state storage device that uses flash memory to store and retrieve digital information. It does not use magnetic storage technology.
  • Magnetic Tape: Magnetic tape is a magnetic storage medium that uses a long, narrow strip of plastic coated with magnetic material to store and retrieve digital information.

So, the correct option is 3) Memory Card, as it is not a magnetic storage device.

Computer Knowledge - 7 - Question 7

Which of the following is NOT a menu bar option in MS-Word 365?

Detailed Solution for Computer Knowledge - 7 - Question 7

The correct answer is Dictate

Key Points

  • Dictate: This is not typically a menu bar option in MS-Word 365. Instead, Dictate is a speech recognition feature which allows you to voice-type text directly into a document without having to use your keyboard.
  • It can be found under the "Home" tab, and you'll see it as a microphone icon on the toolbar.

Additional Information

  • File: Contains basic file operations like New, Open, Save, Print, Share, and Export.
  • Home: Holds the most commonly used tools such as cut, copy, paste, font settings, paragraph settings, and styles.
  • Insert: Allows you to insert various elements into your document such as tables, pictures, shapes, charts, hyperlinks, headers and footers, page numbers, and text boxes.
  • Design: Helps to set and modify themes, colors, fonts, paragraph spacing, and page borders.
  • Layout/Page Layout: Provides various text layout options such as margins, orientation, page size, columns, breaks, line numbers, and hyphenation.
  • References: Contains features that you would use when creating a research paper or citing sources, such as table of contents, footnotes, endnotes, citations and bibliography, captions, index, and table of authorities.
  • Mailings: Used for making envelopes and labels, and to perform Mail Merge operations.
  • Review: Provides proofing and language tools. It includes spelling and grammar check, word count, thesaurus, translate, comments, track changes, and protect document.
  • View: Offers different ways to view your document including Read Mode, Print Layout, Web Layout, Outline, and Draft views. It also provides other viewing options like zoom, ruler, gridlines, navigation pane, and macros.
  • Additional tabs like "Developer" and "Forms" which can be visible based on the personal or enterprise settings of the specific software. Also, when performing certain tasks or using certain tools, new tabs may appear. For example, if you insert a table, a "Table Tools" option will appear with two extra tabs, "Design" and "Layout," specifically for working with tables.

Computer Knowledge - 7 - Question 8

What is the shortcut to auto sum all the numerical values in a column in MS Excel?

Detailed Solution for Computer Knowledge - 7 - Question 8

The correct answer is Alt + =

Key Points

In Microsoft Excel, the Alt + = keyboard shortcut triggers the AutoSum feature.

  • Here's a simple step-by-step guide of how it works:
  • Click into the cell where you want the sum to appear.
  • Press Alt + = on your keyboard.
  • Excel will then highlight all the contiguous numerical data above (if there are any) until it hits a non-numeric cell or a blank cell. It will create a sum function specifying the range it detected. The range will be displayed in the cell where the cursor currently is.
  • Press enter to accept or adjust the range, if needed.

Note: Excel does its best to intuitively figure out the range you're looking to sum, but it's not foolproof. Always double-check to make sure the selected range is correct.

Computer Knowledge - 7 - Question 9

A hacker that changes or forges information in an electronic resource, is engaging in _______ .

Detailed Solution for Computer Knowledge - 7 - Question 9

Data diddling is a type of cybercrime in which data is altered as it is entered into a computer system, most often by a data entry clerk or a computer virus. Computerized processing of the altered data results in a fraudulent benefit.
Hence, Option D is correct.

Computer Knowledge - 7 - Question 10

50,000 bytes = ______________ .

Detailed Solution for Computer Knowledge - 7 - Question 10

50,000 bytes is equal to 50 KB.
Hence, Option D is correct.

Computer Knowledge - 7 - Question 11

Which of the following storage device works on optical medium?

Detailed Solution for Computer Knowledge - 7 - Question 11

Among the given option, Blu-ray Disc is a high-capacity optical disk medium.
Optical storage is any storage type in which data is written and read with a laser.
Hence, option C is the correct answer.

Computer Knowledge - 7 - Question 12

Which of the following connection uses the telephone line to connect?

Detailed Solution for Computer Knowledge - 7 - Question 12

Among the given options, only a dial-up connection uses the telephone line to connect itself to the ISP’s network.
It a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an ISP by dialing a telephone number on a conventional telephone line.
Hence, option C is the correct answer.

Computer Knowledge - 7 - Question 13

What do we call a software that is distributed at no monetary cost to the end user?

Detailed Solution for Computer Knowledge - 7 - Question 13

Freeware is software, most often proprietary, that is distributed at no monetary cost to the end user.
There is no agreed-upon set of rights, license, or EULA that defines freeware unambiguously; every publisher defines its own rules for the freeware it offers.
Hence, option A is the correct answer.

Computer Knowledge - 7 - Question 14

In the context of computers, what does X stands for in ATX?

Detailed Solution for Computer Knowledge - 7 - Question 14

In the context of computers, X in ATX stands for ‘Extended’. The full form of ATX is Advanced Technology Extended.
It is a motherboard and power supply configuration specification developed and patented by Intel in 1995 to improve on previous de facto standards like the AT design.
Hence, option C is the correct answer.

Computer Knowledge - 7 - Question 15

What do we call the case that encloses most of the hardware of a personal computer?

Detailed Solution for Computer Knowledge - 7 - Question 15

A computer case, also known as a computer chassis, is the enclosure that contains most of the hardware of a personal computer.
The components housed inside the case are referred as the internal hardware, while hardware outside the case are known as peripherals.
Hence, option C is the correct answer.

Computer Knowledge - 7 - Question 16

A ________________ is a file that contains one or more sheets to help you organize data in MS-Excel.

Detailed Solution for Computer Knowledge - 7 - Question 16

A workbook is a file that contains one or more worksheets to help you organize data.
You can create a new workbook from a blank workbook or a template.
Hence, option B is the correct answer.

Computer Knowledge - 7 - Question 17

Radio waves are used by which of the following networks to transmit information across the network?

Detailed Solution for Computer Knowledge - 7 - Question 17

The correct option is (4)

Wi-Fi

Concept:-

Radio waves are used by Wi-Fi to send signals and data over short distances.

Key Points

  • Similar to other wireless technology, Wi-Fi transmits signals between devices using radio waves.
  • Modern technology makes extensive use of radio waves for broadcasting, radar, and radio navigation systems, as well as fixed and mobile radio communication.
  • Radio waves are utilized for communication, nautical and aviation navigation, as well as the wireless transfer of sound messages or information.

Additional Information

  • Voice communication is done over a telephone network. Circuit switching is used in telephone networks.
  • A satellite network is made up of nodes that allow for communication between locations on Earth.
  • A company known as an ISP (internet service provider) gives people and organizations access to the internet and other related services.
Computer Knowledge - 7 - Question 18

Which of the following is not a Search Engine?

Detailed Solution for Computer Knowledge - 7 - Question 18

The correct answer is option (3)

Facebook

Concept:-

Google, Yahoo, and Alta Vista are search engines, while Facebook is not a search engine.

Important Points

  • Owned by American business Meta Platforms, Facebook is a social networking and social media website.
  • Facebook offers users powerful search tools that let them discover anything posted by or about a business. At some time, everyone has Googled the name of their company to see what comes up and what others are saying.
  • An online resource that helps consumers find information on the Internet is a search engine.
  • A fully automated search engine, Google Search employs software known as web crawlers to regularly search the internet for pages to add to our index.
  • A search engine and a directory of World Wide Web sites arranged in a hierarchy of topic categories are both included in the Internet portal known as Yahoo!
  • A web search engine called AltaVista was created in 1995. It rose to prominence as one of the most popular early search engines, but it was overtaken by Google and bought by Yahoo! in 2003, which kept the name but based all AltaVista queries on its own search engine.
  • Google. One barely needs to introduce readers to Google given that it holds over 86% of the search market share. It obviously needs to be at the top of any list of search engines, though.
Computer Knowledge - 7 - Question 19

Which of the following is a mini-DIN connector used to connect a keyboard and mouse to a PC compatible computer?

Detailed Solution for Computer Knowledge - 7 - Question 19

The correct answer is PS/2 port.

Key Points

  • The PS/2 port is a 6-pin mini-DIN connector used for connecting keyboards and mice to a PC-compatible computer system.
  • Its name comes from the IBM Personal System/2 series of personal computers, with which it was introduced in 1987.
  • PS/2 ports for mouse and keyboard are usually color-coded, green for the mouse and purple for the keyboard, to prevent confusion.
  • Though USB has largely replaced PS/2 for keyboard and mouse interfaces, some motherboards still come with PS/2 ports since they can offer benefits like full n-key rollover, which can be useful to gamers.

Additional Information

  • Ethernet port
    • An Ethernet port, also known as a jack or socket, is an opening on network equipment that Ethernet cables plug into.
    • These ports are often found on network devices like routers, switches, or modems and are used to connect a device to a network, typically a Local Area Network (LAN), via a wired connection.
  • VGA port
    • A Video Graphics Array (VGA) port is a type of video connection developed by IBM and commonly found on computers.
    • It's used to connect the computer to a display monitor, projector, or television.
    • It's an analog interface that carries video data as separate Red, Green, and Blue channels.
  • RS232 port
    • An RS232 port, sometimes called a serial port or COM port, is a type of interface that is commonly used for serial communication between devices.
    • It was once a standard feature on personal computers for connecting peripherals like mice, keyboards, and printers, but has largely been substituted by USB.
Computer Knowledge - 7 - Question 20

Which of the following keyboard shortcuts is used to open the print option in MS-Word 2010?

Detailed Solution for Computer Knowledge - 7 - Question 20

The correct answer is Ctrl + P.

Key Points

  • Ctrl + P is the standard keyboard shortcut used to open the print dialog in most Windows applications, including MS-Word 2010.
  • This shortcut is universally recognized and works across various software, making it a quick and efficient way to access the print options.
  • Using Ctrl + P opens the print dialog where users can select the printer, adjust settings, and print the document.
  • The print dialog provides options such as selecting the range of pages to print, number of copies, and printer properties.
  • Knowing this shortcut can significantly enhance productivity by saving time spent navigating through menus.
  • This functionality is consistent across different versions of Microsoft Word, including Word 2010, 2013, 2016, and later versions.

Additional Information

  • Alt + D + P
    • This shortcut does not perform any specific function in MS-Word 2010.
  • Ctrl + D + P
    • This combination is incorrect and does not trigger any action in MS-Word 2010.
  • Alt + F + K
    • This shortcut sequence is used to open the "File" menu and then navigate to the "Print" option, but it is less efficient than using Ctrl + P.
Information about Computer Knowledge - 7 Page
In this test you can find the Exam questions for Computer Knowledge - 7 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Knowledge - 7, EduRev gives you an ample number of Online tests for practice

Top Courses for SSC CGL

Download as PDF

Top Courses for SSC CGL