Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
21. There are many types of plotters available. Which of the following is the type of a plotter?
[A] Drum Plotter
[B] Flatbed Plotter
[C] Handheld plotter
[D] Both a and b
Show Answer
Correct Answer: D [Both a and b]
Notes:
There are two main types of plotters – drum and flatbed plotters. Drum plotters spin the paper back and forth on a cylindrical drum while the ink pens move left and right. The drum plotters are generally smaller than flatbed plotters.
22. Which of the following are the another names for a PEN Drive?
[A] USB Flash Drive
[B] Gig Stick
[C] Thumb Drive
[D] All of the Above
Show Answer
Correct Answer: D [All of the Above]
Notes:
Pen Drive is also known as a USB flash drive, thumb drive, pen drive, gig stick, flash stick, jump drive, disk key. It is a data storage device that includes flash memory with an integrated USB interface. It is typically removable, rewritable and much smaller than an optical disc.
23. A software is a set of instructions or programs to execute a specific task. Which one is not a form of software?
[A] Microsoft Word
[B] Microsoft Excel
[C] Microsoft PowerPoint
[D] Monitor
Show Answer
Correct Answer: D [Monitor]
Notes:
Software is a general term for the various kinds of programs used to operate computers and related devices. Monitor is a hardware component soft the computer system.
24. What is plan 9 form the Bell labs?
[A] It is a distributed operating system.
[B] The first official release was in 2015.
[C] Both a and b
[D] None of the Above
Show Answer
Correct Answer: C [Both a and b]
Notes:
Plan 9 from Bell Labs is a distributed operating system. It originated in the Computing Sciences Research Center (CSRC) at Bell Labs in the mid-1980s.
25. An application program that gathers user information and sends it to someone through the Internet is known as?
[A] Spyware
[B] Virus
[C] Logic Bomb
[D] Patch
Show Answer
Correct Answer: A [Spyware]
Notes:
Spyware is an unwanted software that infiltrates the computing device, stealing internet usage data and sensitive information and sending it to someone across internet.
26. What is the name given to the malicious software that is considered to fall between normal software and a virus?
[A] Spyware
[B] Greyware
[C] Malware
[D] Spam
Show Answer
Correct Answer: B [Greyware]
Notes:
Greyware is a term for which all other malicious software such as adware, spyware, trackware, and other malicious code and malicious shareware fall under.
27. What is full form of PEGI?
[A] Pan-English Game Information
[B] Pan-European Game Information
[C] Pan-English Ground InfoTech
[D] None of the Above
Show Answer
Correct Answer: B [Pan-European Game Information]
Notes:
PEGI stands for Pan-European game information. It is rating system based on existing systems in Europe that is used on computer and video games and other computer software.
28. Who among the following invented the FORTRAN language?
[A] J.W.Backus
[B] Steff Warner
[C] Von Neuman
[D] All of the Above
Show Answer
Correct Answer: A [J.W.Backus]
Notes:
John Warner Backus was an American computer scientist. He invented and implemented FORTRAN which is the first widely used high- level programming language. He was the inventor of the Backus–Naur form (BNF).
29. What is the name given to the view of database that appears to an application program?
[A] Schema
[B] Metadata
[C] Front end
[D] Subschema
Show Answer
Correct Answer: D [Subschema]
Notes:
The subschema is the logical description of that section of the database which is relevant and available to an application. A subschema is a subset of the schema and inherits the same property that a schema has.
30. There is a situation in which resources are held by two or more connections that are each needed by the other connections. What is the name given to such a situation?
[A] Deadlock
[B] Debugging
[C] Instance
[D] Remote Procedure Call
Show Answer
Correct Answer: A [Deadlock]
Notes:
Deadlock is a situation in which resources are held by two or more connections that are each needed by the other connections so that they are stuck in an infinite wait loop.