Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
21. Which type of failure occurs because of input device that does not read data correctly ?
[A] input error
[B] output error
[C] read error
[D] write error
Show Answer
Correct Answer: C [read error]
Notes:
This error appears with such a message “A disk read error occurred. This message refers to the problem on your hard drive or issues during the process of the reading disk with the operating system.
22. There is an incidence when computer’s speed begins to drop. In this situation which element of memory is likely to be overloaded ?
[A] RAM
[B] ROM
[C] Flash Memory
[D] Cache Memory
Show Answer
Correct Answer: A [RAM]
Notes:
Computer programs and operating systems load into RAM. If it has a lot of processes running at one time, RAM may become overworked and performance can suffer.
23. Which is the memory that works on time sharing principle in order to create an illusion of infinite memory space?
[A] Cache memory
[B] Register
[C] Virtual memory
[D] Primary memory
Show Answer
Correct Answer: C [Virtual memory]
Notes:
Virtual memory is that uses hardware and software to allow a computer to compensate for physical memory shortages by temporarily transferring data from random access memory (RAM) to disk storage.
24. Who among the following gave the first theory related to computer software?
[A] Ada Lovelace
[B] Alan Turing
[C] Steve Jobs
[D] Bill Gates
Show Answer
Correct Answer: B [Alan Turing]
Notes:
The first theory about software prior to creation of computers was proposed by Alan Turing in his 1935.This eventually led to the creation of the academic fields of computer science and software engineering.
25. Which of the following softwares is used to drive microprocessor-based systems?
[A] Firmware
[B] Assembly Language Program
[C] Flowchart Instructions
[D] Basic Interpreter Instructions
Show Answer
Correct Answer: B [Assembly Language Program]
Notes:
An assembly language is any low-level programming language in which there is a very strong correspondence between the program’s statements.
26. Which of the following accurately defines the concept of Modularization?
[A] A program where the instructions are modules.
[B] A technique in which the software is divided into various distinct modules.
[C] A module being an independent software component.
[D] A method where software is evolved through natural selection.
Show Answer
Correct Answer: B [A technique in which the software is divided into various distinct modules.]
Notes:
Modularization is a technique in software engineering where the software is divided into separate sub-programs or modules. Each module is a self-contained unit that contributes to the total functionality of software. It enhances the overall manageability of software, increases reuse, and improves comprehensibility. It fosters collaborative development as multiple developers can work on different modules simultaneously.
27. Who among the following is known as the father of the DBMS?
[A] Van Neumann
[B] E.F.Codd
[C] Steve Jobs
[D] Bill Gates
Show Answer
Correct Answer: B [E.F.Codd]
Notes:
Dr E.F.Codd is also known to the world as the ‘Father of Database Management Systems’. He had propounded 12 rules which are in-fact 13 in number. The rules are numbered from zero to twelve. According to him, a DBMS is fully relational if it abides by all his twelve rules.
28. What is the full form of RAID?
[A] Redundant Array of Inexpensive Disks
[B] Replicated Array of Independent Data
[C] Redundant Array of Independent Disks
[D] All of the Above
Show Answer
Correct Answer: C [Redundant Array of Independent Disks]
Notes:
RAID stands for Redundant Array of Independent Disks. It is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
29. Which of the following is used to represent a Weak entity set?
[A] Line
[B] Diamond
[C] Double Diamond
[D] Double Rectangle
Show Answer
Correct Answer: C [Double Diamond]
Notes:
In a relational database, a weak entity is an entity that cannot be uniquely identified by its attributes alone. It must use a foreign key in conjunction with its attributes to create a primary key.
30. Which of the following device is used to convert the native data into signal?
[A] OCR
[B] Modem
[C] Printer
[D] Monitor
Show Answer
Correct Answer: B [Modem]
Notes:
As data cannot be sent in its native form, it is necessary to convert it into signal. This is performed with the help of a transmitter such as modem.