Type Here to Get Search Results !

GK in Computer| Computer questions and answers| 50 questions.

GK in Computer| Computer questions and answers| 50 questions.

GK in Computer| Computer questions and answers| 50 questions. 

GK in Computer| Computer questions and answers| 50 questions.  including WBPSC, PSC, SSC, RRB NTPC, UPSC, NDA, WBP, constable, postal, etc Exams.

The computer Gk question is a very important question because it is the time to prepare for the competitive exam. Students are often confused to solve computer GK questions in Bengali competitive exams. So, here I am sharing selected computer Gk questions including WBCS, PSC, SSC, RRB NTPC, UPSC, NDA, WBP, constable, postal, etc exam. and bank exam answers.

আপনি যদি একটি প্রতিযোগিতামূলক পরীক্ষার জন্য প্রস্তুতি নিচ্ছেন, তাহলে আপনার কর্মক্ষমতা উন্নত করতে আপনার কম্পিউটারের Gk প্রশ্ন গুলি পড়তে হবে। এই প্রশ্নগুলি আপনাকে প্রতিযোগিতামূলক পরীক্ষায় কম্পিউটার GK প্রশ্ন গুলি সমাধান করতে এবং পরীক্ষায় উচ্চ স্কোর করতে সাহায্য করবে।

GK in Computer| Computer questions and answers| 50 questions. 

1. The first computer virus is --------?

Ans. Creeper.

2. To protect a computer from viruses, you should install -------- in your computer?

Ans. antivirus.

3. Which of the following is known as Malicious software?

Ans. malware


4. McAfee is an example of?

Ans. Antivirus.

5. A ------- is a computer program that can invade a computer and perform a variety of functions ranging from annoying(e.g. popping up messages as a joke) to dangerous (e.g. deleting files)

Ans. Computer Virus.

6. When a logic bomb is activated by a time-related event, it is known as -------

Ans. time bomb.

7. -------- are often delivered to a PC through an email attachment and are often designed to do harm

Ans. Virus.

8. The altering of data so that it is not usable unless the changes are undone is

Ans. encryption.

 9. VIRUS stands for

Ans. Vital Information Resource Under Siege.

10. What is short for malicious software (software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems)?

Ans. Malware.

11. Which of the following is not an antivirus software?

Ans. Code Red.

12. Which of the following is/are threats to electronic payment systems?

Ans. All of the above.

13. A virus that migrates freely within a large population of unauthorized email users is called a -------

Ans. macro.

14. -------- are attempts by individuals to obtain confidential information from you to falsifying their identity

Ans. Phishing scams.

15. Authentication is

Ans. hard to assure the identity of the user on a remote system.

16. A -------- is a computer program that can replicate itself and spread from one computer to another

Ans. Computer Virus.

17. Which of the following virus overtake computer system, when it boots and destroys information?

Ans. Stealth virus.

18. Key logger is a

Ans. Spyware.

19. To protect yourself from computer hackers, you should turn on a

Ans. Firewall. 

20. Firewalls are used to protect against 

Ans. unauthorized access.

21. Which of the following describes programs that can run independently travel from system to system and disrupt computer communication?

Ans. Worm.

22. -------- Software are programs that are installed onto your computer and can scan and remove known viruses which you may have contracted.

Ans. Antivirus.

23. Code red is a(n) ----------

Ans. Virus.

24. Which of the following would most likely not be a symptom of a virus?

Ans. The CD–ROM stops functioning.

 25.. …………….. are used in denial-of-service attacks, typically against targeted websites

Ans. Zombie.

26. Select the correct order for the different phases of virus execution. i) Propagation phase ii) Dormant phase iii) Execution phase iv) Triggering phase

Ans. ii, i, iv and iii.

27. A ……………… attaches itself to executable files and replicates, when the infected program is executed, by finding other executable files to infect

Ans. Parasitic Virus.

28.. ………….. is a form of virus explicitly designed to hide itself from detection by antivirus software

Ans. Stealth virus.

29. A ……………….. creates copies during replication that are functionally equivalent but have distinctly different bit patterns

Ans. Polymorphic Virus.

30. A portion of the Polymorphic virus, generally called a ……………….., creates, a random encryption, key to encrypt the remainder of the virus

Ans. mutation engine.

31. State whether the following statement is true. i) A macro virus is platform-independent. ii) Macro viruses infect documents, not executable portions of code

Ans. Both i and ii.

32. The type(s) of auto executing macros, in Microsoft word is/are

Ans. All of the above.

33. In …………….., the virus places an identical copy of itself into other programs or into certain system areas on the disk

Ans. Propagation phase.

34. A ……………… is a program that secretly takes over another Internet-attached computer and then uses that computer to launch attacks

Ans. Zombie.

35. What is the name of the Act that governs internet usage in India?

Ans. The Information Technology Act, 2004.

36. All of the following are examples of real security and privacy risks EXCEPT

Ans. Spam.

37. A worm is...

Ans. Pieces of malicious code that make copies of themselves and spread through computers without human interaction.

38. You just got a new computer which has antivirus software already installed. Is it safe to use on the internet immediately?

Ans. No.

39. Why might someone break into (hack) your computer?

Ans. All of the above.

40. If you receive an email claiming to need your username and/or password, what should you do?

Ans. Report it as phishing/spam through your email provider .

41. Both email attachments and downloaded files can spread malware

Ans. TRUE.

 42. What is the best way to protect your information when you are away from your computer?

Ans. Lock the computer with a password.

43. What is a firewall?

Ans. A filter for an internet connection that monitors outgoing and incoming activity.

44. A strong password should contain

Ans. At least 8 characters, and a combination of letters, numbers, and characters.

45. Social engineering is

Ans. Scams distributed through email such as phishing, pharming and impersonation.

46. What is “Trend Micro”?

Ans. It is anti-virus software.

47. What is the name of the viruses that fool a user into downloading and/or executing them by pretending to be useful applications?

Ans. Trojan horses.

48. The virus that spread in application software is called as

Ans. Macro virus.

49. How does a Le-Hard virus come into existence?

Ans. Command.Com.

50. What is the virus that spreads in computers?

Ans. It is a computer program.

GK in Computer| Computer questions and answers| 50 questions. 

কম্পিউটার mcq প্রশ্ন ও উত্তর| বিভিন্ন পরীক্ষায় আসা কম্পিউটার প্রশ্ন pdf| ক্লাস 5 কম্পিউটার প্রশ্ন উত্তর| কম্পিউটার বেসিক প্রশ্ন উত্তর| কম্পিউটার বেসিক প্রশ্ন pdf| কম্পিউটার পরীক্ষার প্রশ্ন ২০২৩| কম্পিউটার পরীক্ষার প্রশ্ন ও উত্তর| ষষ্ঠ শ্রেণীর কম্পিউটার প্রশ্ন উত্তর|

সাধারণ জ্ঞান বিষয়টি বিশেষ গুরুত্ব পূর্ণ ভাবে প্রকাশ করা হল GK in Computer। এই সমস্ত GK in Computer গুলি সাধারণত বিভিন্ন প্রতিযোগিতামূলক পরীক্ষা যেমন:- পশ্চিমবঙ্গ স্টাফ সিলেকশন কমিশনের ক্লার্ক, ডব্লু.বি.সি.এস প্রিলিমিনারি, মিসলেনিয়াস সার্ভিসেস পরীক্ষা, কেন্দ্রীয় স্টাফ সিলেকশনের হায়ার সেকেন্ডারি ও গ্র্যাজুয়েট লেভেল গ্রুপ -ডি, রাজ্য ও কোলকাতা পুলিশ কনস্টবল পরীক্ষা সহ বিভিন্ন প্রতিযােগিতামূলক চাকরীর পরীক্ষায় যে ধরনের প্রশ্ন আসার সম্ভাবনা উপর ভিত্তি করে বাংলা কারেন্ট অ্যাফেয়ার্স MCQ নিয়ে এসেছি।

আপনাদের সকলকে অসংখ্য ধন্যবাদ সময় করে আমাদের` এই “Today GK Quiz– Current Affairs in Bengali | বিভিন্ন প্রতিযোগিতামূলক পরীক্ষার (Like Railway, SSC, PSC, WBPSC, NTPC, Navy, UPSC, School Service all Competitive exams GK in Bengali)” পােস্টটি ভালো ভাবে পড়ার জন্য ধন্যবাদ। এই ভাবেই আমাদের –Today Gk All Exams-এর পাশে থাকুন, বিভিন্ন প্রতিযোগিতামূলক পরীক্ষার সমস্ত বিষয়ের যেকোনো প্ৰশ্ন-এর উত্তর জানতে এই আমাদের ওয়েবসাইট টি ফলাে করুন এবং আপনার সাধারণ জ্ঞান ও কারেন্ট অ্যাফেয়ার্স এর ভান্ডারকে বৃদ্ধি করার জন্য অব্যশই ফলাে করতে পারেন, ধন্যবাদ।

একটি মন্তব্য পোস্ট করুন

0 মন্তব্যসমূহ
* Please Don't Spam Here. All the Comments are Reviewed by Admin.