Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
1. Which among the following is not a payment card technology?
[A] Magnetic Stripe Card
[B] Smart Card
[C] Fleet Card
[D] All of them are payment card technologies
Show Answer
Correct Answer: D [All of them are payment card technologies ]
Notes:
EMV is a payment method based upon a technical standard. It is for smart payment cards and for payment terminals and automated teller machines which can accept them. EMV originally stood for “Europay, Mastercard, and Visa”, the three companies which created the standard. The Magnetic strip cards,smart cards and Fleet cards are the different technologies available.
2. Which of the following Key is not found in normal computers / laptops?
[A] Turn key
[B] Alt key
[C] del key
[D] shift key
Show Answer
Correct Answer: A [Turn key ]
Notes:
Turn key is involving the provision of a complete product or service that is ready for immediate use. It is not found is normal computers.
3. The terms “push and pull services” in context with the Banking are used in which among the following generally?
[A] Rural Banking
[B] Unit Banking
[C] Mobile Banking
[D] Online banking
Show Answer
Correct Answer: C [Mobile Banking ]
Notes:
Mobile Banking, refers to sms sending on customer’s request and without requests.
4. As a person working in internet banking environment, why you should be aware of the “Dictionary attack”?
[A] It is used to inject worms or viruses in the system
[B] It is used to determine a password
[C] It is used to access customer’s account by determining other details
[D] It is used for stealing info from the Credit Card
Show Answer
Correct Answer: B [It is used to determine a password ]
Notes:
A dictionary attack is a method of breaking into a password-protected computer or server. It is done by systematically entering every word in a dictionary as a password. A dictionary attack is used as an attempt to decrypt a message or document.
5. The terms Goodput, Throughput and Maximum throughput are most closely associated with which among the following in computers?
[A] Bit Rate
[B] Response Time
[C] Command Line Interface
[D] Random memory
Show Answer
Correct Answer: A [Bit Rate ]
Notes:
The bit rate is the number of bits that are conveyed or processed per unit of time in computing and telecommunication. For example 1 kbit/s refers to 1000 bits/s while 1MBPS means one million bits per second. One byte per second (1 B/s) corresponds to 8 bit/s.
6. Dynamic Adhoc Wireless Networks (DAWN) usually come under ___?
[A] 2G
[B] 3G
[C] 4G
[D] 5G
Show Answer
Correct Answer: D [5G]
Notes:
The DAWN Dynamic Ad-hoc Wireless Networks project is developing a general theory of complex and dynamic wireless communication networks. It comes under 5G.
7. One nibble is equal to_?
[A] 4 Bits
[B] 4 Bytes
[C] 8 Bytes
[D] 8 Kilo Bytes
Show Answer
Correct Answer: A [4 Bits]
Notes:
In computing, a nibble (often nybble or even nyble to simulate the spelling of byte) is a four-bit aggregation, or half an octet. As a nibble contains 4 bits, there are sixteen possible values, so a nibble corresponds to a single hexadecimal digit (thus, it is often referred to as a “hex digit” or “hexit”).
8. Which of the following devices comprise the output unit?
[A] Control Unit
[B] Visual Display Unit
[C] Secondary Memory
[D] Primary Memory
Show Answer
Correct Answer: B [Visual Display Unit]
Notes:
Devices like a printer and visual display unit that are used to provide information to the user in the desired format are called output unit.
9. What was the name of the first vacuum tube invented by Lee de Forest in 1906?
[A] Colossus
[B] Leedion
[C] Audion
[D] Radion
Show Answer
Correct Answer: C [Audion]
Notes:
Audion was the first vacuum tube invented in 1906 by Lee de Forest. It was the size of a person’s thumb and glowing red hot like a tiny electric light bulb. This bagged him the nickname as “the father of radio”.
10. Who had developed a computer named “Woz” described as the hacker’s hacker?
[A] Steve Wozniack
[B] Ed Roberts
[C] Steve Jobs
[D] Federico Faggin
Show Answer
Correct Answer: A [Steve Wozniack]
Notes:
Steve Wozniak was a Californian electronics wizard, had developed a computer of his own named “Woz” often described as the hacker’s hacker.