Tag: static gk
Computer Science GK-Set 15
401. A database that spreads information across different tables while maintaining links between them is referred to as Answer: Relational database 402.________ is a method of storing data on two or more hard drives that work in combination to do the job…
Computer Science GK-Set 14
376. A network consists of interconnected Answer: Workstations 377. Which is not true for LAN? Answer: It is a public network. 378. Which of the following is not a transmission medium? Answer: Modem 379. Faster data communication is possible using Answer: Optical…
Computer Science GK-Set 13
326.________ program gives instructions regarding operations inside the computer. Answer: System software 327. The first electronic computer was made in the year Answer: 1946 328. The record produced in an audit trail is known as Answer: Journal tape 329. A group of…
Computer Science GK-Set 12
301. Documents of the web that are transported over the Internet are called Answer: Web pages 302. The ability to convey a message without disclosing your name or identity is called Answer: Anonymity 303. A computer program that scans resumes and is…
Computer Science GK- Set 11
276. The silicon chips used in computers are made from Answer: Ordinary sand 277. In modems, the data transfer rate is measured in Answer: Bits per second 278. The output of a 2 input and gate is 1 only when its Answer:…
Computer Science GK -Set 10
251. To prepare a presentation/slide show on which application is commonly used Answer: Powerpoint 252. — is the process of carrying out commands Answer: Executing 253.Which of the following refers to the fastest, biggest, and most expensive computers Answer: Supercomputers 254. Microsoft…
Computer Science GK-Set 9
226. A repair for a known software bug, usually available at no charge on the internet, is called a (n) Answer: Patch 227. In the URL http://www.yahoo.com. The portion labelled http is the Answer: Protocol 228. In the database, a field is…
Computer Science GK- Set 8
201. Which of the following is normally used to initialize a computer system’s hardware? Answer: Random access memory 202. Which is NOT a good Web security strategy? Answer: Removing unnecessary compilers and interpreters 203. The different styles of lettering in a word-processing…
Computer Science GK-Set 7
176. If you do not want to select any option after opening a menu, then click the menu title again or press key ________ to close the menu. Answer: Escape 177. It is easier to change the name of a file using…