computer general knowledge in hindi,computer gk questions with answers pdf, computer general knowledge quiz, computer gk objective questions, computer gk questions with answers in english pdf, computer questions for competitive exams, basic computer questions and answers, computer general knowledge questions and answers pdf free download

Computer Gk For All Competitive Exams Series #74

Hello readers,

If you are doing preparation for SSC, BANKS, LIC,HSSC Exams, come to us regularly. COMPUTER Gk  for SSC, BANKS, LIC,HSSC Exams like SSC CGL, SSC CHSL, BANK PO, BANK CLERK, LIC AO, haryana police, gram sachiv, clerk, canal patwari, HPSC etc. ।Computer General Knowledge  Computer General Knowledge Questions । haryana general knowledge and current affairs ।. । haryana Samanyagyan ।

1461. _____ servers store and manages files for network users.
1) Authentication
2) Main
3) Web
4) File√
5) None of these
1462. All of the following are examples of real security and
privacy risks except?
1) hackers
2) spam√
3) viruses
4) identify theft
5) None of these

1463. Loading Operating System onto RAM is called?
1) Printing 2) Saving
3) Booting√
4) Staring
5) None of these
1464. In MICR, C stands for?
1) Code 2) Colour
3) Computer
4) Character√
5) None of these
1465. System software is the set of programs that enables your
computer’s hardware devices and ____ software to work
1) management
2) processing
3) utility
4) application√
5) None of these
1466. ___ are specially designed computer chips reside inside
other devices, such as your car or your electronic thermostat?
1) Servers
2) Embedded computers√
3) Robotic computers
4) Mainframes
5) None of these
1467. The following are all computing devices, except?
1) notebook computers
2) cellular telephones
3) digital scanners√
4) personal digital assistants
5) None of these
1468. In a ring topology, the computer in possession of the
_____ can transmit data?
1) packet
2) data
3) access method
4) token√
5) None of these
1469. This part of operating system manages the essential
peripherals, such as the keyboard, screen, disk drives and
parallel and serial ports ______
1) basic input/output√
2) secondary system
3) peripheral system
4) marginal system
5) None of these
1470. The bar at the top of a window that bears the name of the
window is known as?
1) control panel
2) task bar
3) menu bar
4) status bar
5) title bar√
1471. ______ controls the way in which the computer system
functions and provides a means by which users can interact
with the computer.
1) The platform
2) Application software
3) Operating system√
4) The motherboard
5) None of these
1472. Servers are computers that provide resources to other
computers connected to a?
1) mainframe
2) network√
3) super computer
4) client
5) None of these
1473. A device that operates under the control of another
device is called?
1) Stem 2) Slave√
3) Simulator
4) Emulator
5) None of these
1474. URL stands for?
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator√
4) Uniform Research Locator
5) None of these
1475. A database management system (DBMS) is a?
1) hardware system used to create, maintain and provide
controlled access to a data- base
2) hardware system used to create, maintain, and provide
uncontrolled access to a database.
3) software system used to create, maintain, and provide
uncontrolled access to a database.
4)software system used to create, maintain and provide
controlled access to a database. √
5)None of these
1476. The design of the network is called the network?
1) architecture√
2) server
3) transmission
4) type
5) None of these
1477.A Proxy server is used for which of the following?
1)To provide security against unauthorized users
2)To process client requests for web pages√
3)To provide TCP/IP
4)To process client requests for database access
5) None of these
1478.When data changes in multiple lists and all lists are not
updated, this causes?
1) data redundancy
2) information overload
3) duplicate data
4) data inconsistency√
5) None of these
1479._____ are words that a programming language has set
aside for its own use?
1) Control words
2) Reserved words√
3) Control structures
4) Reserved keys
5) None of these
1480.The most frequently used instru-ctions of a computer
program are likely to be fetched from?
1) the hard disk
2) cache memory√
3) RAM
4) registers
5) None of these

Thank you for reading the Computer gk questions answers for SSC, BANK, HSSC exams On 



Leave a Comment