Computer Awareness MCQs for Banking : Set 4 | GK Infopedia

Spread the love

[1] The SubSeven is an example of :
A. antivirus
B. Spyware
C. Spam
D. Trojan horse
Ans: Trojan horse
Explanation : SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

[2] Which among the following is the most suitable type of network that phone lines would use?
A. WAN
B. Bluetooth
C. WWAN
D. Infra-red
Ans: WAN
Explanation : Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing email, chatting, etc.

[3] What does JAR stand for?
A. jQuery Application Rapid-development
B. Java Application Resolution
C. Java Archive
D. jQuery Application Resolution
Ans: Java Archive
Explanation : In software, JAR (Java Archive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file to distribute application software or libraries on the Java platform.

[4] Which among the following type of computers is also known informally as Number crunchier?
A. Mini computer
B. Super computer
C. Micro computer
D. Mainframe computer
Ans: Super computer
Explanation : Super Computers are also known as number crunchers. A super computer's dominant characteristic is its ability to perform large amounts of numerical computations quickly.

[5]The dual-port version of DRAM formerly used in graphics adaptors is :
A. FPM DRAM
B. EDORAM
C. VRAM
D. DDRSDRAM
Ans: VRAM
Explanation : Video RAM, or VRAM, is a dual-ported variant of dynamic RAM (DRAM), which was once commonly used to store the frame buffer in some graphics adapters.

[6] Which of the following is a term related with printer?
A. DVD
B. Cartridge
C. Hard-disk
D. Keyboard
Ans: Cartridge
Explanation : An ink cartridge or inkjet cartridge is a component of an inkjet printer that contains the ink that is deposited onto paper during printing.

[7] To justify the selected text, the shortcut key is __.
A. Ctrl+1
B. Ctrl+J
C. Ctrl+U
D. Ctrl+Alt+K
Ans: Ctrl+J
Explanation : To make text justified, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press J. To make the text left aligned again, press and hold down Ctrl on the keyboard and press L.

[8] Trackball is an example of a/an _.
A. Programming device
B. Pointing device
C. Output device
D. Software device
Ans: Pointing device
Explanation : Trackball An input device that looks like an upside down mouse. The picture of the Logitech cordless trackball mouse is an example of a trackball mouse that uses the thumb for movement.

[9] Which of the following is a programming language?
A. Lotus
B. Pascal
C. MS-Excel
D. Netscape
Ans: Pascal
Explanation : Pascal is a general-purpose, high-level language that was originally developed by Niklaus Wirth in the early 1970s. It was developed for teaching programming as a systematic discipline and to develop reliable and efficient programs. Pascal is Algol-based language and includes many constructs of Algol.

[10] BIOS stands for:
A. Basic Input Output Service
B. Basic Inner Output System
C. Better Input Output Service
D. Basic Input Output System
Ans: Basic Input Output System
Explanation : Sol. BIOS is the acronym for Basic Input Output. The BIOS is a type of firmware used to perform hardware initialization during the booting.

[11] Who was the inventor of Tabulating Machine?
A. Charles Babbage
B. Blaise Pascal
C. Ada Byron
D. Herman Hollerith
Ans: Herman Hollerith
Explanation : The tabulating machine was an electromechanical machine designed to assist in summarizing information and, later, accounting. Invented by Herman Hollerith, the machine was developed to help process data for the 1890 U.S. Census.

[12] is an essential program which makes it easy to use a computer for end-user.
A. Operating system
B. Application
C. Utility
D. Network
Ans: Operating system
Explanation : Operating System acts as an interface between the computer components and the user making it easy for the end user to operate the system.

[13] Which disk is used to cold boot a PC?
A. Setup disk
B. System disk
C. Diagnostic Disk
D. Program disk
Ans: System disk
Explanation : Another name for a bootable diskette, a floppy disk (or CD-ROM) that a computer can use to boot the operating system (OS) if the hard drive fails to boot the OS. The user can change the system BIOS so that the hard drive is read before the floppy drive.

[14] In second generation, which type of memory was used to store data?
A. Paper tapes
B. Magnetic drum
C. Magnetic core
D. Magnetic tape
Ans: Magnetic core
Explanation : In second generation, magnetic cores were used as primary memory and magnetic tape and magnetic disks as secondary storage devices. In this generation assembly language and high-level programming languages like FORTRAN, COBOL was used.

[15] The first electronic digital computer contained:
A. Electronic valves
B. Neural Networks
C. Fuzzy Logic
D. Multiprocessor
Ans: Electronic valves
Explanation : The first electronic digital computer contained electronic valves.

[16] What is the blinking symbol on the screen that shows where the next character will appear?
A. Cursor
B. Delete key
C. Arrow key
D. Return key
Ans: Cursor
Explanation : In computer user interfaces, a cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.

[17] Which type of device is used by banking websites to enter the password and prevent keystroke legging?
A. Scanner
B. Reader
C. Virtual keyboard
D. Light Pen
Ans: Virtual keyboard
Explanation : A virtual keyboard is used for entering characters in a computer like a regular keyboard. However, unlike a regular keyboard, it is a software component.

[18] Artificial intelligence is used in which of the following generations of computers?
A. Second
B. Third
C. Fourth
D. Fifth
Ans: Fifth
Explanation : Fifth Generation: Artificial Intelligence (Present and Beyond) Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today.

[19] Which of the following computers exhibits the features of both analog and the digital computers?
A. Hybrid computer
B. Mini computer
C. Laptop
D. Mainframe computer
Ans: Hybrid computer
Explanation : The Computer that exhibits the features of both digital and analog computers is known as a hybrid computer.

[20] A _’s main purpose is to prohibit unauthorized access to your computer via the Internet.
A. Popup blocker
B. Firewall
C. Spyware blocker
D. Spam assassin
Ans: Firewall
Explanation : A firewall acts as a barrier between a trusted network and an untrusted network. A firewall controls access to the resources of a network through a positive control model. This means that the only traffic allowed onto the network is defined in the firewall policy; all other traffic is denied.

[21] =Sum (S3 : S10) is an example of a -
A. function
B. formula
C. cell address
D. value
Ans: formula
Explanation : It is a formula to get sum of the data from cell number S3 to S10.

[22] What is the blinking symbol on the screen that shows where the next character will appear?
A. Cursor
B. Delete key
C. Arrow key
D. Return key
Ans: Cursor
Explanation : In computer user interfaces, a cursor is an indicator used to show the current position for user interaction on a computer monitor or other display device that will respond to input from a text input or pointing device.

[23] BIOS stands for .
A. Basic Input Output Service
B. Basic Inner Output System
C. Better Input Output Service
D. Better Input Output System
Ans: Better Input Output Service
Explanation : BIOS is the acronym for Basic Input Output. The BIOS is a type of firmware used to perform hardware initialization during the booting.

[24] Which of the following error occurs when software tries to access protected memory?
A. Segmentation Fault
B. Display time Error
C. IO Error
D. Runtime Error
Ans: Segmentation Fault
Explanation : A segmentation fault is a common condition that causes programs to crash; they are often associated with a file named core. They are caused by a program trying to read or write an illegal memory location. In other words, this is a memory access violation error.

[25] Choose the odd one out:
A. Brute force attack
B. Virtual Reality
C. Unethical Phreaker
D. Keystroke logging
Ans: Virtual Reality
Explanation : Virtual Reality (VR) is the use of computer technology to create a simulated environment. Unlike traditional user interfaces, VR places the user inside an experience. Instead of viewing a screen in front of them, users are immersed and able to interact with 3D worlds.



Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *