Computer Awareness MCQs for Banking : Set 17 | GK Infopedia

Spread the love

[1] The software that is used to create text based documents is referred as :
A. DBMS
B. Suits
C. Spreadsheets
D. Word processor
Ans: Word processor
Explanation : Word processors are used to create text based documents.

[2] What is the number of function keys on a keyboard?
A. 15
B. 12
C. 11
D. 16
Ans: 12
Explanation : There are 12 function keys from F1 to F12 on a keyboard.

[3] What is the smallest and largest font size available in Font Size tool of MS World on formatting toolbar?
A. 8 and 72
B. 8 and 68
C. 6 and 72
D. 6 and 68
Ans: 8 and 72
Explanation : 8 and 72 are the smallest and the largest font size available in Word for formatting.

[4] A character that is raised and smaller above the baseline is known as .
A. Raised
B. Outlined
C. Capscript
D. Superscript
Ans: Superscript
Explanation : The following text is written in superscript: SuperscriptsHere the text is raised and smaller above the baseline.

[5] In MS-Word, a ruler can help to perform which of the following actions?
A. to set tabs
B. to set indents
C. to change page margins
D. All of the above
Ans: All of the above
Explanation : All the given activities can be performed by using a ruler in MS Word.

[6] Which key should be pressed to start a new paragraph in MS-Word?
A. Down Cursor Key
B. Enter Key
C. Shift + Enter
D. Ctrl + Enter
Ans: Enter Key
Explanation : You can press enter key and start a new paragraph while typing on MS Word.

[7] Which bar is usually located below that Title Bar that provides categorized options?
A. Menu bar
B. Status Bar
C. Tool bar
D. Scroll bar
Ans: Menu bar
Explanation : Menu Bar is located below title bar.

[8] What is the maximum zoom percentage in Microsoft PowerPoint?
A. 1
B. 2
C. 4
D. 5
Ans: 4
Explanation : 400% is the max. zoom percentage in PowerPoint.

[9] Which among the following option does DBMS helps to achieve?
A. Data independence
B. More redundancy
C. Centralised manner to control of data
D. Both (1) and (3)
Ans: Both (1) and (3)
Explanation : DBMS reduces data redundancy, provide a centralised manner to control of data and enabled data independence.

[10] What is Telnet?
A. Network or Telephones
B. Television Network
C. Remote Login
D. All of these
Ans: Remote Login
Explanation : Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

[11] What does the computer Motherboard contains that houses setting configurations and is powered by the onboard battery?
A. CMOS
B. RAM
C. DRAM
D. CPU
Ans: CMOS
Explanation : The CMOS is a physical part of the motherboard: it is a memory chip that houses setting configurations and is powered by the on board battery.

[12] Which of the following is a machine independent program?
A. High level language
B. Low level language
C. Assembly language
D. Machine language
Ans: High level language
Explanation : It is a machine independent language. It enables user to write programs in a language which resemble English words and familiar mathematical symbols.

[13]Which organization developed MS DOS?
A. Apple
B. Microsoft
C. Google
D. IBM
Ans: Microsoft
Explanation : MS DOS stands for Microsoft Disk Operating System it is a discontinued operating system for x86-based personal computers mostly developed by Microsoft.

[14] Bridge is a device.
A. layer 4
B. layer 2
C. layer 5
D. layer 7
Ans: layer 2
Explanation : A bridge is a network device used at the data link layer to connect two dissimilar networks as well as similar networks.

[15] Which among the following organization developed a SAGA-220 super computer in 2011?
A. ISRO
B. NASA
C. C-DAC
D. BARC
Ans: ISRO
Explanation : SAGA-220 is a supercomputer built by the Indian Space Research Organization (ISRO).

[16] A commonly used graphic format for the Web is .
A. GIF
B. BMP
C. TXT
D. LMP
Ans: GIF
Explanation : The Graphics Interchange Format (GIF) is used to save simple Web graphics having limited colours. This image format is usually used for Web buttons, charts and text headings.

[17] Which of the following cable types is called cheapernet?
A. Thicknet
B. UTP
C. SMF
D. Thinnet
Ans: Thinnet
Explanation : As the installation cost of thinned coaxial cable is less, it is also known as cheapernet.

[18] The first electronic digital computer contained _.
A. Electronic valves
B. Neural Networks
C. Fuzzy Logic
D. Semiconductor memory
Ans: Electronic valves
Explanation : The first electronic digital computer contained electronic valves.

[19] The menu contains the options to add symbols in a Word document.
A. Home
B. Insert
C. Review
D. Mailing
Ans: Insert
Explanation : The Insert menu is MS Word contains the Symbol option that allows you to insert symbols in the document.

[20] is the time taken by the switch in the identification of bit-level errors in the data packet.
A. Processing delay
B. Queuing delay
C. Transmission delay
D. Propagation delay
Ans: Processing delay
Explanation : Processing delay is the amount of time taken by the switch for examining the header of the data packet and examining the next switch for redirecting the data packet.

[21] You can select which of the following format to save a document in a previous Word version?
A. Word 97-2003 Document
B. Word Template
C. XPS Document
D. Open Document Text
Ans: Word 97-2003 Document
Explanation : Word 97-2003 Document is a compatible format used to save a document in a compatibility mode with previous versions of Word document.

[22] A Bug can be called an error which generally comes in software or a hardware. Which among the following is another name that may refer to bugs in computers?
A. Leech
B. Squid
C. Slug
D. Glitch
Ans: Glitch
Explanation : Glitch is a term used to express temporary malfunctioning of software, whereas a bug refers to a problem inherent in the design or coding of the software.

[23] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A. hacker
B. analyst
C. instant messenger
D. programmer
Ans: hacker
Explanation : Hacker is someone who seeks and exploits weaknesses in a computer system.

[24] How long is an IPv6 address?
A. 32 bits
B. 128 bytes
C. 64 bits
D. 128 bits
Ans: 128 bits
Explanation : IPv6 address is 128 bits long.

[25] What does P2P stands for?
A. Peer To Peer
B. Peek to peek
C. Past to past
D. Pair to pair
Ans: Peer To Peer
Explanation : P2P stands for Peer to Peer.



Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *