General Knowledge Question Answer: Computer GK Questions and Answers

General Knowledge Computer Questions, Computer Quiz for Competitive Exams, Important Computer MCQs for GK

Q. This part of the operating system manages the essential peripherals, such as the keyboard, screen, disk drives, and parallel and serial ports
1) basic input/output system
2) secondary input/output system
3) peripheral input/output system
4) marginal input/output system

View Answer

Q. A database management system (DBMS) is a
1) hardware system used to create, maintain and provide controlled access to a database.
2) hardware system used to create, maintain and provide un-controlled access to a database.
3) software system used to create, maintain and provide un-controlled access to a database.
4) software system used to create, maintain and provide controlled access to a database.

View Answer

Q. In a ring topology, the computer in possession of the ___ can transmit data.
1) packet
2) data
3) access method
4) token

View Answer

Q. The following are all mobile computing devices, except
1) notebook computers
2) cellular telephones
3) digital scanners
4) personal digital assistants

View Answer

Q. A goal of data mining includes which of the following?
1) To explain some observed event of condition
2) To confirm that data exists
3) To analyse data for expected relationships
4) To create a new data warehouse

View Answer

Q. URL stands for
1) Universal Research List
2) Universal Resource List
3) Uniform Resource Locator
4) Uniform Research Locator

View Answer

Q. ___ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
1) Data
2) Sales
3) Query
4) Point-of-sale (POS)

View Answer

Q. ___ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
1) Servers
2) Embedded computers
3) Robotic computers
4) Mainframes

View Answer

Q. All of the following are examples of real security and privacy risks except
1) hackers
2) spam
3) viruses
4) identity theft

View Answer

Q. ___ serves store and manage files for network users.
1) Authentication
2) Main
3) Web
4) File

View Answer

Career Scope in Interior Design

Interior design is a fun and creative field. It mixes art and practicality to make spaces look good and work well. With more people wanting great places to live and work, the need for skilled interior designers is rising. Let’s look at what it takes to have a career in interior design, including nee →

Commonwealth of Independent States (CIS)

Foundation Date: December 8, 1991 Headquarters: The Republic of Belarus Executive Secretaries: Sergei Lebedev Member Countries: 12 Commonwealth of Independent States (CIS) was established on December 8, 1991, and the leaders of the Republic of Belarus, the Russian Federation, and Ukraine signed an a →

What is Bitcoin?

In 2009, an unknown programmer by the name of Satoshi Nakamoto put forward a whitepaper that proposed a creation of new form of digital currency - cryptocurrency. Cryptocurrency functions the same way as regular currencies do in that its used as a means of exchange, unit of account and a store of va →

Food Safety and Standards Authority of India (FSSAI)

Headquarter: New Delhi Function and Objective of the Organization: The Food Safety and Standards Authority of India (FSSAI)has been established under Food Safety and Standards Act, 2006 which consolidates various acts & orders that have hitherto handled food-related issues in various Ministries →