Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
21. What is the name given to the storage device used for storing very small amounts of data such as small audio and video files?
[A] Magnetic card
[B] Magnetic tape
[C] Punched card
[D] Optical mark reader
Show Answer
Correct Answer: A [Magnetic card]
Notes:
A magnetic card is a type of card capable of storing data. The magnetic card sometimes called swipe card or magstripe. Magnetic cards are commonly used in credit cards, identity cards, and transportation tickets.
22. Who among the following gave the first theory related to computer software?
[A] Ada Lovelace
[B] Alan Turing
[C] Steve Jobs
[D] Bill Gates
Show Answer
Correct Answer: B [Alan Turing]
Notes:
The first theory about software prior to creation of computers was proposed by Alan Turing in his 1935.This eventually led to the creation of the academic fields of computer science and software engineering.
23. There is a software that protects a computer against viruses by identifying and removing any computer virus. What is name of this software?
[A] Diagnostic Utility
[B] Antivirus
[C] Screen Saver
[D] Windows Facility
Show Answer
Correct Answer: B [Antivirus]
Notes:
Antivirus software, or anti-virus software is a computer program used to prevent, detect, and remove malware. If properly installed on a computer system, it can prevent access to computer systems by unwanted computer malwares .
24. Which of the following are different SDLC Models?
[A] Waterfall Model
[B] Iterative Model
[C] Big Bang Model
[D] All of the Above
Show Answer
Correct Answer: D [All of the Above]
Notes:
There are several SDLC models available such as Waterfall Model, Iterative Model, Spiral model, V-model and Big-bang Model etc.
25. Which of the following is the term used to describe software that is pre-packaged by the developer of the product?
[A] On-the-shelf
[B] Pre installed
[C] Off-the-shelf
[D] Both b and c
Show Answer
Correct Answer: C [Off-the-shelf]
Notes:
Off-the-shelf is a term used to describe software or hardware that is pre-packaged by the developer of the product. For example, Microsoft Office is a Commercial off-the-shelf product that is a packaged software solution for businesses.
26. What is the term used for computer software that is undergoing testing and has not yet been officially released?
[A] Alpha Software
[B] Beta Software
[C] Gamma Software
[D] Ready-to-use Software
Show Answer
Correct Answer: B [Beta Software]
Notes:
Beta software refers to computer software that is undergoing testing and has not yet been officially released. The beta phase follows the alpha phase.
27. What is the full form of BASIC?
[A] Beginners All Purpose Symbolic Instruction Code
[B] Basic All Purpose Synthesis Instruction Code
[C] Beginners All Purpose Symbolic Instruction Code
[D] Beginners All Possible Symbolic Instruction Code
Show Answer
Correct Answer: A [Beginners All Purpose Symbolic Instruction Code]
Notes:
BASIC stands for Beginners All Purpose Symbolic Instruction Code. It is a family of general-purpose, high-level programming languages whose design philosophy emphasizes ease of use.
28. Which of the following programming languages was designed for the use in Healthcare Industry?
[A] FORTRAN
[B] MUMPS
[C] COBOL
[D] BASIC
Show Answer
Correct Answer: B [MUMPS]
Notes:
MUMPS stands for Massachusetts General Hospital Utility Multi-Programming System. It is a general-purpose computer programming language originally designed in 1966 for the healthcare industry.
29. What is the full form of HIDS?
[A] Host Based Intrusion Detection System
[B] Housing Intruder Detection System
[C] Host In Device Server
[D] None of the Above.
Show Answer
Correct Answer: A [Host Based Intrusion Detection System]
Notes:
A host-based intrusion detection system is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces.
30. What is the actual measurement of data that can be sent over network?
[A] Bandwidth
[B] Throughput
[C] Queue size
[D] None of the above
Show Answer
Correct Answer: B [Throughput]
Notes:
The throughput is the actual measurement of data that can be sent over network. It is different from Bandwidth which is the maximum amount of data that can travel through a network.