Computer Awareness MCQs for Banking : Set 16 | GK Infopedia

Spread the love

[1] What is included in an e-mail address?
A. Domain name followed by user’s name
B. User’s name followed by domain name
C. User’s name followed by postal address
D. User’s name followed by street address
Ans: User’s name followed by domain name
Explanation : An email address consists of two parts, a local-part or user name and a domain-part separated by an “@” – in steve@example.com, steve is the local-part or user name and example.com is the domain- part.

[2] Personal computers used a number of chips mounted on a main circuit board. What is the common name for such boards?
A. Daughterboard
B. Motherboard
C. Father board
D. Childboard
Ans: Motherboard
Explanation : A motherboard is one of the most essential parts of a computer system. It holds together many of the crucial components of a computer, including the central processing unit (CPU), memory and connectors for input and output devices.

[3] Which of the following statements is true for three-tier architecture?
A. It is easy to setup
B. It has a simply structure
C. It provides high network traffic
D. It is more secure
Ans: It is more secure
Explanation : In the three-tier architecture, there is an additional server, called the application server, between the client and database servers. The application server reduces the work of the database server, thereby making application processing efficient.

[4] Who among the following is/were inventor of transistors?
A. Walter Houser Brattain
B. John William
C. John Bardeen
D. Both (1) and (3)
Ans: Both (1) and (3)
Explanation : Walter Houser Brattain was an American physicist, along with John Bardeen and William Shockley, invented the point-contact transistor.

[5] The amount of vertical space between lines of text in a document is called:
A. double-space
B. indentation
C. single space
D. crop
Ans: single space
Explanation : single space is the vertical space between lines of text in a document. Microsoft Word allows you to customize the lines between a paragraph to be single spaced (one line high).

[6] Which among the given options in Microsoft PowerPoint will allow you to select more than one slide in a presentation?
A. Alt + Click each slide
B. Shift + drag each slide
C. Shift + Click each slide
D. Ctrl + Click each slide
Ans: Shift + Click each slide
Explanation : Shift + Click each slide is the appropriate action to be performed to select more than one slide in a presentation.

[7] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A. program thievery
B. data snatching
C. software piracy
D. program looting
Ans: software piracy
Explanation : Software piracy is the illegal copying, distribution, or use of software.

[8] In first generation of computers, they used _.
A. batch processing
B. multithreading
C. multiprogramming
D. networking
Ans: batch processing
Explanation : In First Generation mainly batch processing operating system were used.

[9] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A. hacker
B. analyst
C. instant messenger
D. programmer
Ans: hacker
Explanation : Hacker is someone who seeks and exploits weaknesses in a computer system.

[10] Who among the following is known as the Father of The Internet?
A. Tim Berners-Lee
B. Raymond Tomilson
C. Douglas Englebart
D. Vint Cerf
Ans: Vint Cerf
Explanation : Tim Berners-Lee- Inventor of the World Wide Web. Berners-Lee is the director of the World Wide Web Consortium (W3C), which oversees the continued development of the Web.

[11] Which among the following is a device that has functioning of a mobile information manager?
A. PDA
B. MICR
C. Mainframe
D. Light Pen
Ans: PDA
Explanation : Personal Digital Assistant (PDA) is a device with functioning of a mobile information manager.

[12] IEEE standard 802.3 is for which of the following?
A. Higher Layer LAN Protocols
B. Wireless PAN
C. Ethernet
D. Bluetooth certification
Ans: Ethernet
Explanation : IEEE 802 is a family of IEEE standards dealing with local area networks and metropolitan area networks. 802.3 is for Ethernet.

[13] A nibble refers to:
A. 4 bits
B. A value equal to a kilobyte
C. A value equal to a megabyte
D. The smallest unit of digital information
Ans: 4 bits
Explanation : Nibble= 4 Bits

[14] What does BASIC stands for?
A. Beginner’s All-purpose Simple Instruction Code
B. Beginner’s All-purpose Symbolic Intention Code
C. Beginner’s All-purpose symbolic Instruction code
D. Beginner’s All-purpose Symbolic Instruction Cell
Ans: Beginner’s All-purpose symbolic Instruction code
Explanation : BASIC stands for Beginner’s All-purpose symbolic Instruction code.

[15] A commonly used graphic format for the Web is _.
A. GIF
B. BMP
C. TXT
D. LMP
Ans: GIF
Explanation : The Graphics Interchange Format (GIF) is used to save simple Web graphics having limited colours. This image format is usually used for Web buttons, charts and text headings.

[16] Identify the volatile storage device amongst the following devices?
A. RAM
B. Hard disc
C. Magnetic tape
D. ROM
Ans: RAM
Explanation : A volatile device is a device that stores data temporarily. An example of a volatile device is RAM.

[17] Which type of device is used by banking websites to enter the password and prevent keystroke legging?
A. Scanner
B. Reader
C. Virtual keyboard
D. Light Pen
Ans: Virtual keyboard
Explanation : A virtual keyboard is used for entering characters in a computer like a regular keyboard. However, unlike a regular keyboard, it is a software component.

[18] ports connect special types of music instruments to sound cards.
A. MIDI
B. CPU
C. USB
D. BUS
Ans: MIDI
Explanation : MIDI stands for Musical Instrument Digital Interface, is a technical standard that describes a protocol, digital interface and connectors and allows a wide variety of electronic musical instruments, computers and other related devices to connect and communicate with one another.

[19] Which of the following statements is true for three-tier architecture?
A. It is easy to setup
B. It has a simply structure
C. It provides high network traffic
D. It is more secure
Ans: It is more secure
Explanation : In the three-tier architecture, there is an additional server, called the application server, between the client and database servers. The application server reduces the work of the database server, thereby making application processing efficient.

[20] What does a computer system includes?
A. Hardware
B. Software
C. Peripheral devices
D. All of these
Ans: All of these
Explanation : A computer system includes hardware components, software, peripheral devices.

[21] What is Direct X?
A. Operating system
B. Software that drives graphics hardware to enable game and multimedia to your system
C. Web browser
D. Word processing software
Ans: Software that drives graphics hardware to enable game and multimedia to your system
Explanation : Microsoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms.

[22] To which of the following categories do operating systems and debuggers belong?
A. System software
B. Application software
C. Utilities
D. Programming Language
Ans: System software
Explanation : System software is developed to serve as a bridge between the hardware and the user, as the software directly communicates with the hardware. Operating systems and debuggers are two best examples of system software.

[23] In number system, LSD stands for .
A. Left Significant Digit
B. Low Significant Digit
C. Lower Significant Digit
D. Least Significant Digit
Ans: Least Significant Digit
Explanation : In number system, LSD stands for Least Significant Digit. It refers to those digits that carry least weight.

[24] FORTRAN is a programming language. It is more suitable for _.
A. business applications
B. marketing applications
C. scientific applications
D. statically calculative applications
Ans: scientific applications
Explanation : FORTRAN is the best and only major programming language for scientific applications. It is designed for performing large and complex scientific numerical computing.

[25] Which of the following threads is used in an operating system?
A. User-level thread
B. Kernel-level thread
C. Hardware-level thread
D. Both (1) and (2)
Ans: Both (1) and (2)
Explanation : There are only two types of threads present in an operating system. One is user-level thread and the other is kernel-level thread. User-level threads are the threads which are controlled and managed by the user of the computer system.



Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *