Computer Awareness MCQs for Banking : Set 10 | GK Infopedia

Spread the love

[1] Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?
A. Toggle
B. Cold booting
C. Warm booting
D. Logging off
Ans: Cold booting
Explanation : Reboots can be either cold (alternatively known as hard) where the power to the system is physically turned off and back on again, causing an initial boot of the machine, or warm (alternatively known as soft) where the system restarts without the need to interrupt the power.

[2] Main memory works in conjunction with .
A. special function cards
B. RAM
C. CPU
D. Intel
Ans: CPU
Explanation : Main memory works in conjunction with CPU. Main memory refers to physical memory that is internal to the computer. The word main is used to distinguish it from external mass storage devices such as disk drives. Other terms used to mean main memory include RAM and primary storage.

[3] ports connect special types of music instruments to sound cards.
A. MIDI
B. CPU
C. USB
D. BUS
Ans: MIDI
Explanation : MIDI stands for Musical Instrument Digital Interface, is a technical standard that describes a protocol, digital interface and connectors and allows a wide variety of electronic musical instruments, computers and other related devices to connect and communicate with one another.

[4] Which program, installed on the user’s computer help him to communicate or send request on the network?
A. Paint
B. File Manager
C. Browser
D. Word
Ans: Browser
Explanation : A web browser (commonly referred to as a browser) is a software application for retrieving, presenting and traversing information resources on the World Wide Web.

[5] Which of the following device used ‘set of beads’ to represent the unit of data?
A. ENIAC
B. EDVAC
C. Abacus
D. MARK-I
Ans: Abacus
Explanation : The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool with a set of beads for counting.

[6] Antikythera mechanism was mainly used to perform which computation?
A. Astronomical calculation
B. Logarithm
C. Trigonometry
D. Time calculation
Ans: Astronomical calculation
Explanation : The Antikythera mechanism is an ancient analogue computer and orrery used to predict astronomical positions and eclipses for calendrical and astrological purposes, as well as the Olympiads, the cycles of the ancient Olympic Games.

[7] The first electro-mechanical computer MARK-1 invented was by _.
A. Charles Pascal
B. John W Mauchly
C. Howard Aiken
D. Clifford Berry
Ans: Howard Aiken
Explanation : The Automatic Sequence Controlled Calculator (Harvard Mark I) was the first operating machine that could execute long computations automatically. A project conceived by Harvard University's Dr. Howard Aiken, the Mark I was built by IBM engineers in Endicott, N.Y.

[8] What was the first electronic computer in the world?
A. ENIAC
B. EDSAC
C. EDVAC
D. UNIVAC
Ans: ENIAC
Explanation : ENIAC, in full Electronic Numerical Integrator and Computer, the first programmable general-purpose electronic digital computer, built during World War II by the United States.

[9] What type of monitoring file is commonly used on and accepted from Internet sites?
A. Smartware
B. Phishes
C. Cookies
D. Trojans
Ans: Cookies
Explanation : Cookies are small files which are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer.

[10] What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
A. Haptics
B. Caves
C. Biometrics
D. RFID
Ans: Biometrics
Explanation : Biometrics is the measurement and statistical analysis of people's physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance.

[11] What does the SMTP in an SMTP server stand for?
A. Simple Mail Transfer Protocol
B. Serve Message Text Process
C. Short Messaging Text Process
D. Short Messaging Transfer Protocol
Ans: Simple Mail Transfer Protocol
Explanation : (pronounced as separate letters) Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP.

[12] Which among the following was the first graphical web browser?
A. Mosaic
B. WAIS
C. CERN
D. Gopher
Ans: Mosaic
Explanation : NCSA Mosaic, or simply Mosaic, is a discontinued early web browser. It has been credited with popularizing the World Wide Web. It was the first graphical web browser.

[13] Web pages are created by using which among the following?
A. SMTP
B. HTML
C. Usenet
D. Internet
Ans: HTML
Explanation : Hypertext Markup Language (HTML) is a markup language and it is used to create websites or Web pages.

[14] Which communication mode allows both the sender and the receiver to transmit data at the same time over a single communication channel?
A. Simplex mode
B. Half-duplex mode
C. Full-duplex mode
D. Semi-duplex mode
Ans: Full-duplex mode
Explanation : In the simplex mode, communication is always unidirectional, for example television. In the half-duplex mode, communication is bidirectional but one at a time, which means only one of the parties can send data at a time.

[15] On which of the following models does the working of Bluetooth devices depend?
A. Client/server
B. Peer-to-peer
C. Master/slave
D. Analog/digital
Ans: Master/slave
Explanation : The working of Bluetooth devices is based on a master/slave model. This model contains 266 devices out of which one is a master device and 255 and slave devices.

[16] The first computer was programmed using _.
A. Assembly language
B. Machine language
C. Source code
D. Object code
Ans: Machine language
Explanation : Machine language or machine code was used to build the first computer programming system. This language is technically a system that consists of binary digits.

[17] A/(n) is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
A. email
B. virus
C. web beacon
D. spam
Ans: web beacon
Explanation : Common uses of web beacon are email tracking and page tagging for web analytics. Its alternative names are web bug, tracking bug, tag, or page tag.

[18] Non-physical components of the computer are referred to as _.
A. CPU
B. Software
C. Hardware
D. Peripheral
Ans: Software
Explanation : Memory of computer and the softwares are the non physical component of a computer system.

[19] How many rows are there in latest version of MS Excel?
A. 65536
B. 16384
C. 1048576
D. 1050000
Ans: 1048576
Explanation : You are taken to the bottom row. In the modern versions of Excel there are 1,048,576 rows. In older versions of Excel (2003 and prior) there were 65,536 rows.

[20] Which among the following term is used for those hardware devices that are not part of the main computer system and are often added later to the system?
A. clip art
B. highlight
C. execute
D. peripheral
Ans: peripheral
Explanation : A peripheral device is generally defined as any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way.

[21] Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?
A. ROM
B. EPROM
C. The registers
D. Extended memory
Ans: The registers
Explanation : Most operating Systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.

[22] Which of the following contains permanent data and gets updated during the processing of transactions?
A. Operating System File
B. Transaction file
C. Software File
D. Master file
Ans: Operating System File
Explanation : Operating System File is a type of file that contains permanent data and gets updated later after creation or even during the processing of transactions.

[23] Decryption & Encryption of data are the responsibility of which layer.
A. Physical
B. Data Link
C. Presentation
D. Session
Ans: Presentation
Explanation : Presentation layer is responsible for character-code translation, data conversion, data encryption and decryption, and data translation.

[24] What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
A. Spam
B. Cookie
C. Phish
D. Adware
Ans: Adware
Explanation : Adware is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.

[25] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A. hacker
B. analyst
C. instant messenger
D. programmer
Ans: hacker
Explanation : A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is a Hacker. A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.



Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *