[go: up one dir, main page]

0% found this document useful (0 votes)
55 views8 pages

Computer Awareness MCQ

Uploaded by

Alok kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views8 pages

Computer Awareness MCQ

Uploaded by

Alok kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

These Questions Prepared by: SONU (GK EDITORIAL) www.YouTube.

com/c/GKEDITORIAL
Computer Awareness
MCQs for IBPS, Bank PO/Clerk, RRB, RBI, SBI, NABARD, SSC and other
Entrance/Competitive Exams
1. Which Microsoft-based technology was built to link desktop applications to the World Wide Web?
[A] Active Channel
[B] Active Desktop
[C] ActiveX
[D] None of the above
Correct Answer: C [ActiveX]
Explanation: ActiveX is a software framework created by Microsoft that adapts its earlier Component
Object Model (COM) and Object Linking and Embedding (OLE) technologies for content downloaded from a
network, particularly from the World Wide Web. It is used till IE11 but not Microsoft Edge.

2. Which among the following is the most common source of Viruses to the hard disk of your computer?
[A] Incoming Email
[B] Outgoing Email
[C] CD ROMs
[D] Websites
Ans. a

3. Symantec is the maker of which among the following popular antivirus software?
[A] Norton
[B] BitDefender
[C] Avast
[D] McAfee VirusScan
Ans. a
Explanation: Symantec is an American consumer software company now known as NortonLifeLock. It is the
make of famous software Norton.

4. Which of the following lies within the CPU?


[A] Primary Memory
[B] Secondary Memory
Secondary Memory
[C] Mouse
[D] Keyboard
Ans. a
Explanation: All input data and instructions are stored in the memory which is of two types-primary
memory and the secondary memory. Primary memory resides within the CPU while the secondary
memory is external to it.

5. “Internet escrow ” is a term most commonly related to which of the following?


[A] E-commerce [B] Software Development
[C] Privacy Security [D] Database Management
Ans. a
Explanation: Escrow is a financial instrument whereby an asset is held by a third party on behalf of two
other parties that are in the process of completing a transaction. E commerce hold the asset of a merchant
before it is sold to a customer. So it is Internet escrow.
These Questions Prepared by: SONU (GK EDITORIAL) www.YouTube.com/c/GKEDITORIAL
6. In the Windows XP, what does XP stands for?
[A] Extra-Powerful
[B] Experience
[C] Extended Platform
[D] Experience Platform
Ans. b
Explanation: Windows XP is an operating system introduced in 2001. It is from Microsoft’s Windows. The
“XP” in Windows XP stands for eXPerience. Microsoft called the XP release its one of the most important
product.

7. V-RAM is used for access of the following?


[A] Video & Graphics
[B] Text & Images
[C] programs
[D] None of the above
Ans. a
Explanation: V-Ram is also known as video Ram. It is a dual ported variant of dynamic RAM. VRAM is
basically RAM integrated in a card for using it for storing graphical textures, 3D models temporary. It is
used for video access and graphics.

8. The word bandwidth is also used to mean ________?


[A] width of the data cable
[B] amount of data transferred
[C] number of the computers on a particular network
[D] none of the above
Ans. b
Explanation: Bandwidth refers to the amount of data that can be transmitted in a fixed amount of time.
For digital devices, the bandwidth is usually expressed in bits per second(bps) or bytes per second.

9. Which among the following is correct about 4GL?


[A] A computer brand
[B] A software brand
[C] A software program
[D] A programming language
Ans. d

Explanation: 4GL means fourth-generation programming language

10. As a person working in internet banking environment, why you should be aware of the “Dictionary
attack”?
[A] It is used to inject worms or viruses in the system
[B] It is used to determine a password
[C] It is used to access customer’s account by determining other details
[D] It is used for stealing info from the Credit Card
Ans. b

Explanation: A dictionary attack is a method of breaking into a password-protected computer or server. It


is done by systematically entering every word in a dictionary as a password. A dictionary attack is used as
an attempt to decrypt a message or document.
These Questions Prepared by: SONU (GK EDITORIAL) www.YouTube.com/c/GKEDITORIAL
11. Which of the following is not the basic capability of a computer?
[A] Speed
[B] Accuracy
[C] Prediction
[D] Processing
Ans. c
Explanation: The basic functions of a computer include speed, accuracy, reliability, adaptability and
storage. A computer cannot make predictions by itself. It can only make assessments based on the data
which is fed into it.

12. Which of the following is not an input device of the computer?


[A] Trackball
[B] Image Scanner
[C] Joystick
[D] Sound Card
Ans. d

13. Which of the following is a single integrated circuit on which a CPUs are typically constructed?
[A] Microprocessor
[B] Memory
[C] Motherboard
[D] Hard Disk
Ans. a

14. What kind of data is processed by an analog computer?


[A] Discrete Data
[B] Intermittent Data
[C] Discretely varying Data
[D] Continuously varying Data
Ans. d

15. In which of the following applications are analog computers used?


[A] Measurement of Electric Current
[B] Measurement of Frequency
[C] Measurement of Resistance of a Capacitor
[D] All of the above
Ans. d

16. Where are the instructions which are used to run a digital computer stored?
[A] Motherboard
[B] Hard Disk
[C] Memory
[D] All of the above
Ans. c

17. What are four basic functional elements of a digital computer?


[A] Input-Output Equipment [B] Main Memory
[C] Control Unit and ALU [D] All of the above
Ans. d
These Questions Prepared by: SONU (GK EDITORIAL) www.YouTube.com/c/GKEDITORIAL
18. A device which is not connected to the CPU is known as which of the following?
[A] Land-line device
[B] On-line device
[C] Off-line device
[D] Device
Ans. c

19. What is the full form of UPS?


[A] Unplugged Power Supply
[B] Uninterruptible Power System
[C] Unknown Power Source
[D] Uninterrupted Power Source
Ans. b

20. Monitors, printers, disk drives, keyboard, mouse are included in which of the following categories?
[A] Storage Device
[B] Hardware
[C] Software
[D] All of the Above
Ans. b

21. What is the use of the wheel located between the two standard buttons on a mouse ?
[A] To click on web pages
[B] To click and select items
[C] To shutdown
[D] To scroll
Ans. d

22. Which type of failure occurs because of input device that does not read data correctly ?
[A] input error
[B] output error
[C] read error
[D] write error
Ans. c

23. Document reader and a light pen are classical examples of Which of the following?
[A] Reading devices
[B] Light devices
[C] Input devices
[D] Digital devices
Ans. c

24. Which of the following consist of the computer main memory?


[A] Hard drive and RAM
[B] CD-ROM and hard drive
[C] RAM and ROM
[D] CMOS and hard drive
Ans. c
These Questions Prepared by: SONU (GK EDITORIAL) www.YouTube.com/c/GKEDITORIAL
25. Which of the following is the ability of a system to jump directly to the requested data?
[A] Sequential Access
[B] Random Access
[C] Quick Access
[D] All of the Above
Ans. b

26. The smallest unit in which data can be stored is known by which of the following names?
[A] Bit
[B] Byte
[C] Kilobyte
[D] Megabyte
Ans. a

27. Which of the following is the name given to the number of concentric circles on a diskette?
[A] Sectors
[B] Cylinders
[C] Tracks
[D] Clusters
Ans. c

28. What is the meaning of SMART commands in a system maintainence?


[A] Self-Monitoring, Analysis and Reporting Technology Commands
[B] Software Management Analysis Reporting Technology Commands
[C] Specific Measurable Attainable Realistic Technology Commands
[D] None of the Above
Ans. a

29. Which of the following acts specifically exempts computer-maintenance activities, so copies of
copyright files may be made in the course of maintenance provided that they are destroyed afterwards?
[A] The infringement act
[B] The Digital Millennium Copyright Act
[C] Intellectual Property Rights Act
[D] All of the Above
Ans. b
Explanation: The Digital Millennium Copyright Act leaves computer-maintenance activities. The copies of
copyright files may be made in the course of maintenance provided and they are destroyed afterwards.

30. The copies of data or program files are always stored as a safety. Which of the following is the name
given to these copies?
[A] Backups [B] Programs [C] Extras [D] Stores
Ans. a

31. What is the full form of UDF ?


[A] Universal data frequency [B] Unique disk format
[C] Universal disk format [D] Undated disk format
Ans. c
Explanation: Universal Disk Format (UDF) is a file system for computer data storage for a broad range of
media. UDF is developed and maintained by the Optical Storage Technology Association (OSTA).
These Questions Prepared by: SONU (GK EDITORIAL) www.YouTube.com/c/GKEDITORIAL
32. Which of the following is the another name given to the LCD display?
[A] LED
[B] TFT
[C] CRT
[D] All of the Above
Ans. b

Explanation: A thin-film-transistor or TFT is a variant of a liquid-crystal display (LCD) that uses thin-film-
transistor (TFT) technology to improve image qualities such as addressability and contrast.

33. Which of the following are the hardware components of the computer system?
[A] Graphic Card
[B] CPU
[C] Keyboard
[D] All of the Above
Ans. d

34. Which of the following are the software analysis and design tools?
[A] Data Flow Diagrams
[B] ER Diagrams
[C] HIPO Diagrams
[D] All of the Above
Ans. d

35. Which of the following graphs tell us the correct and appropriate way to determine the deadlock
situation occurrence?
[A] Starvation Graph
[B] Resource Allocation Graph
[C] Inversion Graph
[D] All of the Above
Ans. b

36. Which of the following is the Vector Graphics Editor?


[A] Sunbird
[B] CAD
[C] Adobe Photoshop
[D] Corel Draw
Ans. d

Explanation: CorelDraw is a vector graphics editor developed and marketed by Corel Corporation. It
includes the bitmap-image editor Corel Photo- Paint as well as other graphics-related programs.

37. What is the name given to any software that is included with a new computer, hardware, or other
software program?
[A] Bundled Software
[B] Pre-installed Software
[C] Both a and b
[D] Free Software
Ans. c
These Questions Prepared by: SONU (GK EDITORIAL) www.YouTube.com/c/GKEDITORIAL
38. Who among the following invented the FORTRAN language?
[A] J.W.Backus
[B] Steff Warner
[C] Von Neuman
[D] All of the Above
Ans. a

39. Which of the following are the objects in Microsoft Access?


[A] Tables
[B] Queries
[C] Reports
[D] All of the Above
Ans. d

40. What does ARPANET stand for?


[A] Automated Research Projects Agency Network
[B] American Research Projects Agency Network
[C] Advanced Research Projects Agency Network
[D] American Research Projects Automatic Network
Ans. c

1. Structured programming languages such as C, COBOL and FORTRAN were used in which of the following
computers?
[A] First Generation Computers
[B] Second Generation Computers
[C] Third Generation Computers
[D] Fourth Generation Computers

2. Which of the following blogging platform was first launched by Pyra Labs?
[A] WordPress
[B] Blogger
[C] Typepad
[D] Twitter

3. How are the four main components of a computer interconnected internally?


[A] Cars
[B] Buses
[C] Lines
[D] Rods

4. A communication system which transfers data between the components inside a computer or even
between computers is known as
[A] Bus
[B] Wire
[C] Knot
[D] Line

5. One nibble is equal to_?


[A] 4 Bits [B] 4 Bytes [C] 8 Bytes [D] 8 Kilo Bytes
These Questions Prepared by: SONU (GK EDITORIAL) www.YouTube.com/c/GKEDITORIAL
6. Which among the following key is used for checking grammar and spelling?
[A] F3
[B] F5
[C] F7
[D] F9

7. In a computer file systems which among the following is top or first in hierarchy?
[A] root directory
[B] parent directory
[C] home directory
[D] working directory

8. While working on Microsoft Word, which among the following is the command for “Undo”?
[A] Cntrl +A
[B] Cntrl +Z
[C] Cntrl +Y
[D] Cntrl +C

9. Which of the following are part of the Logical Operations of the computer?
[A] Addition “+”
[B] Greater Than “>”
[C] Subtraction -
[D] Differentials

10. Which of the following is the basic function of a computer?


[A] Input
[B] Storage
[C] Processing
[D] All of the above

Click here for Answers

GK EDITORIAL
Telegram https://t.me/gkeditorialOfficial

Computer Best MCQ Book in Just Rs.39/- [7000+ Question in English]


https://imojo.in/27ql6f4

Computer GK for Competitive Exams [10000 MCQ in English]

You might also like