Computer Awareness MCQs for Banking : Set 3 | GK Infopedia

Spread the love

[1] Which of the following software posts unwanted advertisements on client’s computer?
A. Virus
B. Malware
C. Worm
D. Adware
Ans: Adware
Explanation : Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.

[2] Which of the following is the coding language used to create documents for use on the Internet?
A. HTML
B. HSMT
C. HLTM
D. All of these
Ans: HTML
Explanation : Hypertext Markup Language (HTML) is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScript.

[3] The main agenda for Encryption/decryption is to provide a network with strict .
A. Privacy
B. Authenticity
C. Integrity
D. Non of these
Ans: Privacy
Explanation :

[4] Smart card is:
A. Special purpose cards
B. Microprocessor cards
C. Processing unit contains memory for storing data
D. Processing unit for software handling
Ans: Microprocessor cards
Explanation : A smart card, chip card, or integrated circuit card is a physical electronic authorization device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit chip.

[5] Which of the following option may be used to change page-size and margins?
A. Page Layout
B. View
C. Tools
D. Data
Ans: Page Layout
Explanation : Word also allows you to customize the size of your margins in the Page Setup dialog box. From the Layout tab, click Margins. Select Custom Margins from the drop-down menu. The Page Setup dialog box will appear.

[6] To justify the selected text, the shortcut key is _.
A. Ctrl + 1
B. Ctrl + J
C. Ctrl + U
D. Ctrl + Alt + K
Ans: Ctrl + J
Explanation : To make text justified, select and highlight the text first, then hold down Ctrl (the control key) on the keyboard and then press J. To make the text left aligned again, press and hold down Ctrl on the keyboard and press L.

[7] In www.yahoo.com, www stands for:
A. Web World Wide
B. World Wide Web
C. Wide World Web
D. Worlds Wide Weblinks
Ans: World Wide Web
Explanation : WWW. Stands for "World Wide Web." It is important to know that this is not a synonym for the Internet. The World Wide Web, or just "the Web," as ordinary people call it, is a subset of the Internet.

[8] is the basic communication language or protocol of the Internet.
A. TCTP/ITP
B. TCDP/IEP
C. TCP/IP
D. TCMP/IKP
Ans: TCP/IP
Explanation : TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet).

[9] Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
A. program thievery
B. data snatching
C. software piracy
D. program looting
Ans: software piracy
Explanation : Software piracy is the illegal copying, distribution, or use of software.

[10] In first generation of computers, they used _.
A. batch processing
B. multithreading
C. multiprogramming
D. networking
Ans: batch processing
Explanation : The period of first generation was from 1946-1959. The computers of first generation used vacuum tubes as the basic components for memory and circuitry for CPU. In this generation, mainly batch processing operating system was used. Punch cards, paper tape, and magnetic tape was used as input and output devices.

[11] Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
A. hacker
B. analyst
C. instant messenger
D. programmer
Ans: hacker
Explanation : Hacker is someone who seeks and exploits weaknesses in a computer system.

[12] What are those programs collectively called which are created for performing particular tasks in the computer system?
A. System software
B. Application software
C. Utility software
D. Operating system
Ans: Application software
Explanation : Applications are software or computer programs that are built to execute or allow the execution of special tasks on a computer, such as a music application that enables users to play, learn or even create music.

[13] Which of the following diagrams graphically represents an inter-relationship among entities in a database?
A. Entity-relationship diagram
B. Data flow diagram
C. Control flow diagram
D. Sequence diagram
Ans: Entity-relationship diagram
Explanation : A relationship is an association among entities. We can use the Entity-Relationship Diagram (ERD) to represent an inter-relationship between the entities of a database.

[14] Which of the following keys is a field in one table that is used as a primary key field in another table?
A. Primary key
B. Foreign key
C. Candidate key
D. Identity key
Ans: Foreign key
Explanation : Foreign key is a field in one table that is used as the primary key in another table. Whenever a relationship is created between two tables, a common field acts as the primary key in the first table and the foreign key in the second table.

[15] By what name are two or more fields of a database table called when they are collectively used to specify the primary key?
A. Composite key
B. Primary key
C. Foreign key
D. Candidate key
Ans: Composite key
Explanation : Composite key is formed when two or more fields of a database table are combined together in order to uniquely identify the records stored in the table.

[16] Which of the following is not a normal form in DBMS?
A. First Normal Form (1NF)
B. Second Normal Form (2NF)
C. Third Normal Form (3NF)
D. Ninth Normal For (9NF)
Ans: Ninth Normal For (9NF)
Explanation : In DBMS, the commonly used normal forms are 1NF, 2NF, 3NF and BCNF.

[17] In PowerPoint, view displays all slides of the presentation as a thumbnail and is helpful for repositioning slides?
A. Slide Design
B. Slide Sorter
C. Slide Show
D. Slide Master
Ans: Slide Sorter
Explanation : The Slide Sorter view is a powerful feature of PowerPoint which displays all of slides of a presentation on a single screen in the form of thumbnails. In this view, you can change the sequence of the slides.

[18] Moving a paragraph in MS-word from one place to another can be done by which of the following actions?
A. Select, copy
B. Select all, cut
C. Select, cut and paste
D. Select, design
Ans: Select, cut and paste
Explanation : You can move a letter, word or paragraph by first selecting it, cutting it and then pasting it to the intended location.

[19] Which of the following are tags, when placed on an animal, can be used to record and track in a database all of the animal's movements?
A. POS
B. RFID
C. OCR
D. AR
Ans: RFID
Explanation : Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves.

[20] Which of the following statements is true for baseband signal?
A. It is the source signal
B. It frequency is relatively close to zero
C. It is a modulated signal
D. Option (1) and (2)
Ans: Option (1) and (2)
Explanation : Baseband signals are the information signals that are transmitted without modulation. These signals possess low frequency relatively close to zero.

[21] Which of the following application layer protocols does not use UDP?
A. FTP
B. VoIP
C. DNS
D. SNMP
Ans: FTP
Explanation : Each application layer protocol uses one of the transport layer protocols for transmitting data from one end to another. UDP is an unreliable protocol that does not provide any acknowledgment for the receipt of the data.

[22] The operation performs a set union of two ‘similarly structured’ tables.
A. Union
B. Join
C. Product
D. Intersect
Ans: Union
Explanation : Union operation performs a set union of two ‘similarly structured’ tables.

[23] The software that is used to create text based documents is referred as :
A. DBMS
B. Suits
C. Spreadsheets
D. Word processor
Ans: Word processor
Explanation : A word processor is a device or computer program that provides for input, editing, formatting and output of text, often with some additional features. Early word processors were stand-alone devices dedicated to the function, but current word processors are word processor programs running on general purpose computers.

[24] is a superset of keywords, symbols and a system of rules for constructing statements by which human can communicate the instructions to be executed by a computer.
A. A computer program
B. A programming language
C. An assemble
D. Computer I/O Device
Ans: A programming language
Explanation : A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer.

[25] A vacuum tube (also called a VT, electron tube, a valve) is a device sometimes used to amplify electronic signals. Vacuum Tubes were used in which generation of Computers?
A. 1st Generation
B. 2nd Generation
C. 3rd Generation
D. 4th Generation
Ans: 1st Generation
Explanation : First Generation computers are characterized by the use of vacuum tubes. These vacuum tubes were used for calculation as well as storage and control.



Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *