SSC CGL Exam  >  SSC CGL Tests  >  Computer Knowledge - 10 - SSC CGL MCQ

Computer Knowledge - 10 - SSC CGL MCQ


Test Description

20 Questions MCQ Test - Computer Knowledge - 10

Computer Knowledge - 10 for SSC CGL 2024 is part of SSC CGL preparation. The Computer Knowledge - 10 questions and answers have been prepared according to the SSC CGL exam syllabus.The Computer Knowledge - 10 MCQs are made for SSC CGL 2024 Exam. Find important definitions, questions, notes, meanings, examples, exercises, MCQs and online tests for Computer Knowledge - 10 below.
Solutions of Computer Knowledge - 10 questions in English are available as part of our course for SSC CGL & Computer Knowledge - 10 solutions in Hindi for SSC CGL course. Download more important topics, notes, lectures and mock test series for SSC CGL Exam by signing up for free. Attempt Computer Knowledge - 10 | 20 questions in 15 minutes | Mock test for SSC CGL preparation | Free important questions MCQ to study for SSC CGL Exam | Download free PDF with solutions
Computer Knowledge - 10 - Question 1

Unwanted or unlawful email messages are frequently referred to as___ .

Detailed Solution for Computer Knowledge - 10 - Question 1

The correct answer is option 1.

Key Points

  • Unwanted or unlawful email messages are referred to as spam.
  • Spam emails are usually sent in bulk to a large number of recipients, without their permission.
  • Spam emails can contain various types of content, such as advertisements, scams, malware, or phishing attempts.
  • Spam emails can be harmful to the recipient's privacy, security, and productivity.

Additional Information

  • Anti-virus:
    • It is a software designed to protect a computer or network from malware and other threats.
    • Anti-virus software can detect and remove viruses, spyware, adware, and other malicious software.
    • However, Anti-virus software cannot prevent or stop spam emails from reaching the recipient's inbox.
  • Smishing:
    • Smishing is a type of phishing attack that uses SMS text messages instead of email.
    • Smishing messages usually contain a link or phone number that the recipient is encouraged to click or call, which can lead to fraud or malware infection.
    • Smishing can be prevented by being cautious of unexpected or suspicious text messages, and by not clicking on links or calling numbers from unknown sources.
  • Rootkit:
    • A rootkit is a type of malware that is designed to hide its presence and activities from the user and the anti-virus software.
    • Rootkits can be used to gain unauthorized access to a computer or network, steal data, or perform other malicious activities.
    • However, rootkits are not directly related to spam emails, and can be detected and removed by specialized anti-malware tools.
Computer Knowledge - 10 - Question 2

What does MS-DOS operating system use for interacting with the end users?

Detailed Solution for Computer Knowledge - 10 - Question 2

The correct answer is option 3.

Key Points

  • MS-DOS operating system uses CLI (Command Line Interface) for interacting with end users.
  • CLI is a text•based interface where users enter commands to perform tasks.
  • MS-DOS commands are entered in the CLI prompt and executed by pressing Enter.
  • CLI allows users to perform tasks quickly and efficiently through keyboard shortcuts and command syntax.

Additional Information

  • MPU (Microprocessor Unit): It is a component of a computer system, not an interface for interacting with users.
  • MLI (Machine Language Interpreter): It is a program that translates machine language into human-readable code, but it is not a user interface.
  • CPU (Central Processing Unit): It is the main processing component of a computer system, not an interface for interacting with users.
1 Crore+ students have signed up on EduRev. Have you? Download the App
Computer Knowledge - 10 - Question 3

Match the correct :

Detailed Solution for Computer Knowledge - 10 - Question 3

The correct answer is a - ii, b - iii, c - iv, d - i

Key Points

  • Ubuntu
    • ​It is an open-source operating system.
    • It is a complete Linux operating system, freely available with both community and professional support.
    • It is sponsored by Canonical Ltd.
    • It is suitable for cloud computing, servers, desktops, and internet of things (IoT) devices.
  • Firefox
    • ​It is a Web browser.
    • It was developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation.
  • Ms-Outlook
    • It is the email client included with the Microsoft Office suite.
    • It is a personal information manager software system from Microsoft.
    • It is a part of the Microsoft Office suite.
  • McAfee
    • ​It is an antivirus software created and maintained by McAfee.
    • McAfee VirusScan Enterprise combines anti-virus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software.
Computer Knowledge - 10 - Question 4

_______ is not an example of a word processor.

Detailed Solution for Computer Knowledge - 10 - Question 4

The correct answer is Open Office Calc.

Key Points

  • Word processing software is used for helping users to rewrite, erase or modify a document as per the requirement.
  • Word processing software helps to create reports, stories, letters, resumes, etc.
  • It allows users to edit or modify the new or existing document with colour or any other formats like bold, italic and underline.
  • MS Word, Google Docs and Notepad are examples of word processing software.
  • Development History:
    • OpenOffice Calc is part of Apache OpenOffice, which was originally developed by Sun Microsystems.
    • Oracle Corporation acquired Sun Microsystems in 2010 and continued to develop OpenOffice.org.
    • In 2011, Oracle donated OpenOffice.org to the Apache Software Foundation.
    • Since then, it has been developed under the Apache umbrella as Apache OpenOffice, with significant contributions from the free software community.
  • File Format Compatibility:
    • Apache OpenOffice Calc primarily saves files in its native ODS (OpenDocument Spreadsheet) format.
    • While it can open and save files in Microsoft Excel formats (like XLS), direct support for saving in the XLSX format is limited and may require additional configurations or extensions, unlike LibreOffice which has better direct support for saving in XLSX format.
Computer Knowledge - 10 - Question 5

Which of the following buttons are present in the Quick Access Toolbar by default in MS-Word 2010?

Detailed Solution for Computer Knowledge - 10 - Question 5

The correct answer is Save, Undo, Redo ​

Key Points:

  • The Quick Access Toolbar on the top left corner of the MS-Word 2010 consists of Save options.
  • The Quick Access Toolbar is located next to the Microsoft Office button.
    • It is a customizable toolbar that comes with a set of independent commands.
    • It gives you quick access to commonly used commands like save, undo, redo etc.

Computer Knowledge - 10 - Question 6

1 terabytes per second = ______ bytes per second

Detailed Solution for Computer Knowledge - 10 - Question 6

The correct answer is 240.

Key Points

  • A Terabyte (TB) is a measure of computer storage capacity that is approximately 2 to the 40th power, or 10 to the 12th power, which equals approximately a trillion bytes.
  • A Terabyte is more precisely defined as 1,024 gigabytes (GB), while a petabyte consists of 1,024 TB.
  • A tbyte, terabyte, or TB, is equal to 1,099,511,627,776 (240) bytes.
  • However, the IEC defines a TB as equal to 1,000,000,000,000 (1012) bytes.
  • 1024 TB = 1 petabyte.
  • 1 TB = 1024 gigabytes.
  • The terabyte is a multiple of the unit byte for digital information.
  • The prefix term was defined for the International System of Units in 1960.
Computer Knowledge - 10 - Question 7

_______ refers to a cell or a range of cells on a spreadsheet and can be used to find the values or data that the user wants a formula to calculate.

Detailed Solution for Computer Knowledge - 10 - Question 7

Cell reference refers to a cell or a range of cells on a spreadsheet and can be used to find the values or data that the user wants a formula to calculate. So the answer is (3).

Key Points

  • Cell references can be used in formulas to perform a variety of calculations, such as addition, subtraction, multiplication, and division. They can also be used to reference other worksheets in the same workbook, or even other workbooks.
  • Cell references are made up of a column letter and a row number. For example, the cell reference "A1" refers to the cell at the intersection of column A and row 1. The cell reference "B2" refers to the cell at the intersection of column B and row 2, and so on.
  • To create a cell reference, simply click on the cell or range of cells that you want to reference. The cell reference will appear in the formula bar.
  • Here is an example of a formula that uses cell references:
    • = A1 + B1
  • This formula will add the values in cells A1 and B1 and return the result.
  • Cell references are a powerful tool that can be used to perform a variety of calculations in spreadsheets. They are an essential skill for any spreadsheet user to learn.
Computer Knowledge - 10 - Question 8

Antivirus software is an example of

Detailed Solution for Computer Knowledge - 10 - Question 8

The correct answer is A security utility.

Key Points

  • Antivirus software is an example of a security utility program.
  • It is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses and other malicious software like worms, Trojans, adware, etc.
  • Examples of antivirus software are McAffee, Norton, etc

Important Points

  • Utility software is used to execute operations like virus detection, data backup, and file deletion, among others. Antivirus software, file management tools, compression tools, disc management tools, and so on are some examples.
Computer Knowledge - 10 - Question 9

Which of the following translates internet domain and host names to IP address?

Detailed Solution for Computer Knowledge - 10 - Question 9

The Domain Name System (DNS) translates internet domain and host names to IP address.
Hence, Option B is correct.

Computer Knowledge - 10 - Question 10

Which of the following is the most important/powerful computer in a typical network?

Detailed Solution for Computer Knowledge - 10 - Question 10

Network server is the most important/powerful computer in a typical network.
Hence, Option D is correct.

Computer Knowledge - 10 - Question 11

What is the shortcut for using ‘Thesaurus’ tool in MS-Word?

Detailed Solution for Computer Knowledge - 10 - Question 11

Shift + F1: Reveal formatting
Shift + F4: Page up
Shift + F11: Jump to previous field
Shift + F7: Thesaurus tool
Hence, option D is the correct answer.

Computer Knowledge - 10 - Question 12

In the context of computers, what is the full form of Virus?

Detailed Solution for Computer Knowledge - 10 - Question 12

In the context of computers, VIRUS stands for Vital Information Resources under Siege.
It is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
Hence, option D is the correct answer.

Computer Knowledge - 10 - Question 13

In the context of computers, MITM stands for:

Detailed Solution for Computer Knowledge - 10 - Question 13

In the context of computers, MITM stands for Man in the Middle Attack.
It is an attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them.
Hence, option A is the correct answer.

Computer Knowledge - 10 - Question 14

Which of the following function key opens a chart area to draw a specific chart in MS-Excel?

Detailed Solution for Computer Knowledge - 10 - Question 14

Use of function keys in MS-Excel:
F2: Switch the current worksheet to edit mode.
F5: Displays the ‘Go-To; dialog box.
F11: Opens the chart area in a separate sheet.
F8: Expands the selection.
Hence, option C is the correct answer.

Computer Knowledge - 10 - Question 15

In the context of computers, what does T stands for in FTP?

Detailed Solution for Computer Knowledge - 10 - Question 15

In the context of computers, FTP stands for File Transfer Protocol. So, T stands for Transfer.
It is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network.
Hence, option D is the correct answer.

Computer Knowledge - 10 - Question 16

Which is a standard connector used for computer video output?

Detailed Solution for Computer Knowledge - 10 - Question 16

The Video Graphics Array (VGA) connector is a standard connector used for computer video output.
It is a 15-pin connector that become ubiquitous on PCs, as well as many monitors, projectors and high-definition television sets.
Hence, option C is the correct answer.

Computer Knowledge - 10 - Question 17

In MS Excel 2007, the outlined cell (the one with the dark borders) within the worksheet is referred to as the________.

Detailed Solution for Computer Knowledge - 10 - Question 17

The correct answer is Active cell.

Key Points

  • In MS Excel 2007, the outlined cell (the one with the dark borders) within the worksheet is referred to as the Active cell.
  • The active cell is the selected cell in which data is entered when we begin typing.
  • Microsoft Excel is a spreadsheet developed by Microsoft in 1987 which helps us with graphing tools, pivot tables, calculations, etc.
  • The term Worksheet used in Excel documents is a collection of cells organized in rows and columns.
    • It is the working surface users interact with to enter data.
    • Each worksheet contains 1048576 rows and 16384 columns.

Additional Information

  • The main characteristics of worksheets can be summarized in the following list:
    • Cells: Each worksheet has a significant number of cells that can be assigned values and various formatting options. The Cells property allows you to insert, manipulate and delete worksheet cells.
    • Rows and Columns: Cells in a worksheet are organized into rows and columns. The API of a worksheet allows you to insert, manipulate and delete rows and columns.
    • Collection of Hyperlinks: Each worksheet can contain numerous hyperlinks to web pages, particular cells in the workbook, or email addresses.
    • Protection: You can restrict the user from modifying the content and structure of the worksheet.
    • Mathematical Functions: You can apply most of the mathematical functions to the entire sheet and can compare rows and columns.
Computer Knowledge - 10 - Question 18

The quickest way to create a MS-PowerPoint presentation is to use the _________.

Detailed Solution for Computer Knowledge - 10 - Question 18

The correct answer is Auto content wizard.

Key Points

  • The Auto wizard creates a new presentation using built-in templates, offering content ideas to help and organize the information including each slide.
  • It provides templates and ideas for different types of presentations.
  • It will suggest content relevant to that specific type of presentation.
  • This wizard helps to determine the content and organization of the presentation by using an outline.
  • The AutoContent Wizard helps to choose the best layout for presentation.
  • The Wizard supplies not only the design but also ideas, starter text, formatting and organization.
  • The colour scheme and the background colour will be selected though it and can change this afterward.
Computer Knowledge - 10 - Question 19

How do colours contribute to effective presentation and documents in MS PowerPoint?

Detailed Solution for Computer Knowledge - 10 - Question 19

The correct answer is Colours create a sense of hierarchy and emphasize important information.

Key Points

  • Colors have an impact on the way we see and interpret visual information.
  • They can influence emotion, set the mood, build structure and, emphasize certain elements.
  • This means that choosing the right colors can make your presentation stand out and control how it’s received.
  • Colors are often associated with emotions.
  • Warm colors, like reds, oranges, and yellows can be used to communicate energy, excitement, optimism, and enthusiasm.
  • In contrast, cool colors such as blues, greens, and violets lend feelings of professionalism, dependability, and elegance.
  • One key rule in the use of color theory for presentations is to keep colors simple and balanced.
  • Choose a palette of no more than three colors (black and white don’t count as colors for this purpose).
  • Another rule for balancing the proportions of colors in presentation and design is called the 60-30-10 rule.
  • According to this rule, once you have chosen your three colors, you should use the primary color for 60% of the space on the slides.
  • The secondary color for 30% of the space, and the accent color for 10% of the space.
Computer Knowledge - 10 - Question 20

Identify whether the given statements are true or false.

i. The storage unit of the computer holds only instructions and no data.

ii. Primary memory is temporary in nature.

iii. The secondary memory is slower and cheaper than the primary memory.

Detailed Solution for Computer Knowledge - 10 - Question 20
  • The storage unit of a computer can store both instructions (programs, software, and operating system) and data (documents, multimedia files, databases).
  • To be more specific, the computer storage is categorized into primary storage (like RAM) and secondary storage (like hard drives).
  • Primary Storage : It holds the programs and data that are currently in use by the computer, including the operating system, application programs, and the data being processed.
  • Secondary Storage : It is used to store programs and data that are not in immediate use, but need to persist in a long term. Examples include files and documents stored on a hard drive or SSD, or media files stored in portable storage such as a USB flash drive or an external hard drive.
  • Regardless of the type, both primary and secondary storage can hold both instructions (programs/software) and data.

Hence statement i is false.

  • Primary memory, also known as main memory or volatile memory, is temporary in nature.
  • This includes Random Access Memory (RAM) and cache memory, which both store information only as long as the computer is turned on.
  • Once the computer is shut down or restarted, data stored in primary memory is lost unless it is saved to a more permanent storage medium such as a hard drive or SSD.
  • This is because RAM and other forms of primary memory are volatile, meaning their contents are lost when power is removed.

Hence statement ii is true.

  • Secondary memory, such as hard disk drives (HDD), solid-state drives (SSD), or optical drives, is generally slower but cheaper compared to primary memory, such as RAM.
  • Speed: Primary memory like RAM directly interfaces with the CPU and is designed to provide rapid access to data for immediate processing. Secondary memory has slower access times since the CPU needs to go through various operations such as Input/Output processes to read data from or write data to the secondary storage.
  • Cost: Primary memory like RAM is significantly more expensive to manufacture than secondary memory. On a per-gigabyte basis, secondary memory like hard drives or SSDs is cheaper.
  • It's worth noting that while SSDs (a type of secondary memory) are faster than HDDs and are getting cheaper, they are still more expensive on a per-gigabyte basis than conventional hard drives. Furthermore, while SSDs are fast, RAM (primary memory) is still much faster.

Hence statement iii is true.

Information about Computer Knowledge - 10 Page
In this test you can find the Exam questions for Computer Knowledge - 10 solved & explained in the simplest way possible. Besides giving Questions and answers for Computer Knowledge - 10, EduRev gives you an ample number of Online tests for practice

Top Courses for SSC CGL

Download as PDF

Top Courses for SSC CGL