sponsored links
Which of the following company owns/uses the Virtual Hard Disk (VHD) format for Virtual PC?
Which among the following is a correct definition of "Digital Divide" ?
- Gap between people having access to mobile and internet access
- Gap between people having access to internet / IT and no internet / IT
- Gap between people having access to broadband and narrow band internet
- Gap between people having access to internet banking and normal banking
- Gap between the people having an e-mail account and no e-mail account

When some unidentified / unknown person / firm sends yhou mail in a trustworthy / lucrative way asking for sensitive banks and online payment information, this is a case of ?
- Spam
- Hacking
- Phishing
- Vishing
- Simulation
While working on Microsoft World, which among the following is the command for "Undo" ?
- Cntrl + A
- Cntrl + Z
- Cntrl + Y
- Cntrl + C
- Cntrl + V
Which among the following is the most common source of viruses to the hard disk of your computer?
- Incoming E-mail
- Out going E-Mail
- CD Roms
- Websites
- Mobile
What is the full form of W3C?
- World Wide Web Consortium
- World Wide Web Company
- World Wide Web Center
- World Wide Web Command
- None of these
Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
- Version
- Update
- Help
- Patch
- Syntax
What is the name of the proposed sofdtware application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification Number (PIN) in reverse order?
- ATM Safety PIN
- ATM Safety Pro
- ATM Safety Code
- ATM Safety Sign
- ATM Safety Digit
Microsoft Office is
- Shareware
- Public domain Software
- Open Source Software
- A vartical market application
- an application suite
Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke loging for the password entry?
- Virtual Keyboard
- Finger Touching
- Touchscreen
- Shape Writer
- Dasher
Which among the following is not a security / privacy risk ?
- Spam
- Hacking
- Virus
- Phishing
- Vishing
Now a days Vishing has become a criminal practice of using social engineering over which of the following?
- Social Networking Sites
- Mobile Phones
- E-mails
- Cyber Cafes
- All of the above
ADSL data communications technology uses which of the following for faster data transmission?
- Voice band Modem
- Wireless Modem
- Copper Telephone Lines
- Sockets
- None of the above
While browsing the internet, which of the following key is used for full screen view?
- F3
- F5
- F11
- F9
- F10
Which of the following is a suitable term for any programmable content of a hardware device configurations and data for application-specific integrated circuits (ASICs), programmable logic devices, etc?
- Hardware
- Software
- Firmware
- Malware
- Liveware
Most of the internet sites now a days use CSS primarily to enable the separation of document content (written in HTML or a similar markup language) from document presentation, including elements such as the layout, colors, and fonts, what is the full form of this CSS?
- Cascading Style Software
- Clear Style Sheet
- Cascading Style Sheet
- Common Style Sheet
- Conditional Style Sheet
What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on sleep mode?
- To Reduce Power Consumption
- Back up
- To write contents of RAM to hard disc
- To improve download speed
- None of the above
Which of the following device is a volatile storage?
- RAM
- Hard Disc
- Magnetic Tape
- Floppy Disc
- ROM
What is Office Open XML?
- A file format
- A software
- An electronic device
- An international standard
- None of the above
When cutting and pasting, the item cut is temporarily stored in
- ROM
- Hard Drive
- Diskette
- Dash Board
- Clip Board
thanks mam...........
ReplyDeleteThank u very much....
ReplyDelete(y) too good
ReplyDeletethank u
ReplyDeletethanks....
ReplyDeletethanks......!!!!!!!!
ReplyDeleteNice...
ReplyDeleteThank you :)
ReplyDeletethanku so much mam........
ReplyDeletegood work
ReplyDeletethanx a lottt......for creating such a wonderful site
ReplyDeletethanks...
ReplyDeletemam plz send expected questions related to gk
ReplyDeletemam plz send expected questiond related to gk for SBI PO
ReplyDeleteplz mam send expected questions related to gk of SBI
ReplyDeleteThanksss
ReplyDeletemam plz define vishing....
ReplyDeleteVishing is a combination of "voice" and phishing. Vishing is the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit.
Deletethank u so much :)
ReplyDeletemam where is my comment ..
ReplyDeleteThanks
ReplyDeletevery useful
ReplyDeletethank u
ReplyDeleteThank you..its helpful :)
ReplyDeleteThanx alot...its wounderful site.
ReplyDeleteThank you
ReplyDeleterealy greate
ReplyDeletethanks for valuable material........
ReplyDeletenice
ReplyDeleteCAN YOU PLEASE POST SOME MORE TOUGH QUESTIONS
ReplyDeleteplease post some more questions
ReplyDeletevery nice collection
ReplyDeleteits really very nice data.....pls post something for the descriptive paper
ReplyDeletethank you ...its very good !!
ReplyDeleteTHNX
ReplyDelete