Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
21. Which one is the common device used for drawing, painting, or interactively selecting coordinate positions on an object ?
[A] Image scanner
[B] Digitizers
[C] Data glove
[D] Touch panels
Show Answer
Correct Answer: B [Digitizers]
Notes:
Digitizers can be used for drawing, painting and selecting positions. It is any device which receives analog information and creates a digital representation of it.
22. Which of the following is the name given to the number of concentric circles on a diskette?
[A] Sectors
[B] Cylinders
[C] Tracks
[D] Clusters
Show Answer
Correct Answer: C [Tracks]
Notes:
The platters of a hard disk have two sides for recording the data. Every surface of the platter has invisible concentric circles on it. These circles are called tracks.
23. What is the full form of a PCI bus?
[A] Peripheral Computer Interconnect
[B] Peripheral Component Interconnect
[C] Passed Component Interconnect
[D] Phased Computer Interconnect
Show Answer
Correct Answer: B [Peripheral Component Interconnect]
Notes:
PCI stands for Peripheral Component Interconnect. It is a local computer bus for attaching hardware devices in a computer. The first version of conventional PCI found in consumer desktop computers was a 32-bit bus using a 33 MHz bus clock .
24. Which of the following are the features of a Spreadsheet?
[A] Layers and Lines
[B] Rows and Columns
[C] Layers and Planes
[D] Height and Width
Show Answer
Correct Answer: B [Rows and Columns]
Notes:
A spreadsheet is an interactive computer application for organization, analysis and storage of data in tabular form. The program operates on data entered in cells of a table.
25. Which of the following is the numerical computing software for scientists and mathematicians?
[A] MATLAB
[B] EDGE
[C] Excel
[D] Arc
Show Answer
Correct Answer: A [MATLAB]
Notes:
MATLAB is a multi-paradigm numerical computing environment and proprietary programming language developed by Math Works. It is the easiest and most productive software environment for engineers and scientists.
26. What are the terms used for Technical Debt?
[A] Code Debt
[B] Design Debt
[C] Both a and b
[D] None of the Above
Show Answer
Correct Answer: C [Both a and b]
Notes:
Technical debt is a concept in software development. It reflects the implied cost of additional rework caused by choosing an easy solution now instead of using a better approach.
27. Which of the following is the scripting and programming language developed by John .H.Thompson for use in Adobe Director?
[A] Java
[B] Lingo
[C] VBA
[D] Ruby
Show Answer
Correct Answer: B [Lingo]
Notes:
Lingo is a verbose object-oriented scripting language developed by John H. Thompson for use in Adobe Director. Lingo is used to develop desktop application software, interactive kiosks, CD-ROMs and Adobe Shockwave content.
28. Which among the following are the database languages?
[A] Data Definition Language
[B] Data Manipulation Language
[C] Data Control Language
[D] All of the Above
Show Answer
Correct Answer: D [All of the Above]
Notes:
There are many types of Database Languages. A few among them are – Data Definition Language. DDL stands for Data Definition Language, Data Manipulation Language, Data Control Language etc.
29. Which of the following networking hardware can operate at anyone of the seven layers of the open systems interconnection model?
[A] Router
[B] Gateway
[C] Switch
[D] Modem
Show Answer
Correct Answer: B [Gateway]
Notes:
Gateways are distinct from routers or switches in that they communicate using more than one protocolh6k and can operate at any of the seven layers of the open systems interconnection model .
30. What is the full form of HIDS?
[A] Host Based Intrusion Detection System
[B] Housing Intruder Detection System
[C] Host In Device Server
[D] None of the Above.
Show Answer
Correct Answer: A [Host Based Intrusion Detection System]
Notes:
A host-based intrusion detection system is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces.