Computer Awareness MCQs for Banking : Set 34 | GK Infopedia

Spread the love

[1] A is used to direct and dispatch data packets between different networks.
A. Connection
B. Bridge
C. Gateway
D. Router
Ans: Router
Explanation : A router is used to route data packets between different networks. It reads the information in each packet to tell where it is going.

[2] Dr. E.F. Codd represented rules that a database must obey if it has to be considered truly relational.
A. 10
B. 8
C. 12
D. 6
Ans: 12
Explanation : Dr Edgar F. Codd, after his extensive research on the Relational Model of database systems, came up with twelve rules of his own, which according to him, a database must obey in order to be regarded as a true relational database.

[3] OSI model has how many layers?
A. Two layers
B. Five Layers
C. Seven Layers
D. Six Layers
Ans: Seven Layers
Explanation : OSI Model stands for Open Source Interconnection and it has seven layers: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data link Layer, Physical Layer.

[4] Network is the arrangement of the various elements (links, nodes, etc.) of a computer network.
A. memory
B. topology
C. mainframe
D. protocol
Ans: topology
Explanation : Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. There are two basic categories of network topologies: Physical topologies and Logical topologies.

[5] Which of the following communications modes support two-way traffic but in only one direction of a time?
A. simplex
B. half-duplex
C. three-quarters duplex
D. All of the above
Ans: half-duplex
Explanation : Half Duplex support two-way traffic but in only one direction of a time. For example, a walkie-talkie is a half-duplex device because only one party can talk at a time.

[6] Where are the files deleted from the hard disk sent to?
A. recycle bin
B. floppy disk
C. clipboard
D. clipart
Ans: recycle bin
Explanation : Files deleted from the hard disk sent to the recycle bin.

[7] Which number system is used by computers to store data and perform calculations?
A. binary
B. octal
C. decimal
D. hexadecimal
Ans: binary
Explanation : Computers generally use binary number system.

[8] What is JDBC?
A. Utility Software
B. Application Software
C. Application Programming Interface (API)
D. Programming Language
Ans: Application Programming Interface (API)
Explanation : Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database.

[9] Which of the following is/are modifier keys in a computer?
A. Ctrl
B. Alt
C. Shift
D. All of the above
Ans: All of the above
Explanation : Modifier keys include Alt, Ctrl, Shift. A modifier key is a key that modifies the action of another key when the two are pressed together.

[10] Which one of the following is an Indian super computer?
A. Tianhe-2
B. VIRGO
C. Titan
D. Shaheen II
Ans: VIRGO
Explanation : VIRGO is a supercomputer that was developed by IIT Madras. Tianhe-2 is a super computer that was built by China. Titan is a supercomputer that belongs to USA and Shaheen II is a supercomputer that was built by Saudi Arabia.

[11] Which communication mode allows both the sender and the receiver to transmit data at the same time over a single communication channel?
A. Simplex mode
B. Half-duplex mode
C. Full-duplex mode
D. Semi-duplex mode
Ans: Full-duplex mode
Explanation : In the simplex mode, communication is always unidirectional, for example television. In the half-duplex mode, communication is bidirectional but one at a time, which means only one of the parties can send data at a time.

[12] Walkie-talkie is an example of which of the following?
A. simplex communication
B. half-duplex communication
C. full-duplex communication
D. semi-duplex communication
Ans: half-duplex communication
Explanation : In the case of walkie-talkie, the person at one end sends signals, while the other on the receiving end receives these signals. The person at the receiving end cannot communicate until the person at the first end stops.

[13] Which operation performs a set union of two ‘similarly structured’ tables?
A. Union
B. Join
C. Product
D. Intersect
Ans: Union
Explanation : operation performs a set union of two ‘similarly structured’ tables.

[14] What is a tuple?
A. Row
B. Projection
C. Field
D. Union
Ans: Row
Explanation : Tuple is a row.

[15] In relational database, a field is a:
A. label
B. table of information
C. group of related tables
D. category of information
Ans: category of information
Explanation : A field is category of information.

[16]In order to move from one worksheet to another in MS-Excel workbook, user should click:
A. active cell
B. scroll bar
C. sheet tab
D. tab button
Ans: sheet tab
Explanation : From sheet tab you can move from one worksheet to another in MS Excel.

[17] In a spread sheet, which among the following is a number you may use in a calculation?
A. label
B. cell
C. field
D. value
Ans: value
Explanation : In a spread sheet, a value is a number you will use in a calculation.

[18] When your computer stops working suddenly, it is referred to as a .
A. crash
B. die
C. death
D. penalty
Ans: crash
Explanation : A crash (or system crash) in computing is when a computer program, such as a software application or an operating system, stops functioning properly. Often the program will exit after encountering this type of error.

[19] A string of eight 0s and 1s is called a:
A. Megabyte
B. Kilobyte
C. Gigabyte
D. Byte
Ans: Byte
Explanation : A byte contains a combination of total eight 0s or 1s.

[20] In MS-DOS 6.22, which part identifies that product uniquely?
A. MS
B. DOS
C. MS - DOS
D. 6.22
Ans: 6.22
Explanation : MS-DOS 6.22; 6.22 is the version number which identifies it uniquely.

[21] means that the data contained in a database is accurate, consistent and reliable.
A. Data redundancy
B. Data integrity
C. Data reliability
D. Data inconsistency
Ans: Data integrity
Explanation : Data integrity means that the data contained in a database is accurate, consistent and reliable.

[22] The Sub Seven is an example of:
A. antivirus
B. Spyware
C. Spam
D. Trojan horse
Ans: Trojan horse
Explanation : SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

[23] Which among the following is the most suitable type of network spread over large span that phone lines would use?
A. WAN
B. PAN
C. WWAN
D. CAN
Ans: WAN
Explanation : Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing email, chatting, etc.

[24] What is a simulated experience generated by computer called; like visiting the outer space or stepping on Moon?
A. Extended Reality
B. Virtual Reality
C. Augmented Reality
D. Snooping
Ans: Virtual Reality
Explanation : Virtual reality basically means 'near-reality’; it usually refers to a specific type of reality emulation which is simulated experience generated by a computer.

[25] What is the technology used to read pencil or pen marks on a multiple choice answer sheet called?
A. OMR
B. MICR
C. OCR
D. CPU
Ans: OMR
Explanation : Optical Mark Recognition technology is used to read pencil or pen marks on a multiple choice answer sheet.



Spread the love

Leave a Reply

Your email address will not be published. Required fields are marked *