Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
41. What do we call the boxes in the slides that contain content in them?
[A] Word Art
[B] Text Styles
[C] Placeholder
[D] Animation
Show Answer
Correct Answer: C [Placeholder]
Notes:
In Microsoft PowerPoint, placeholders are boxes with dotted borders that contain content and reside within a slide layout.
42. What is MS Access?
[A] A RDBMS
[B] An OODBMS
[C] An ORDBMS
[D] A Network Database Model
Show Answer
Correct Answer: A [A RDBMS]
Notes:
Microsoft Access is a low cost relational database management system (RDBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools.
43. What does MMS stand for?
[A] Multimedia Mobile Service
[B] Media on Mobile Service
[C] Multimedia Messaging Service
[D] Multiple Mobile Settings
Show Answer
Correct Answer: C [Multimedia Messaging Service]
Notes:
Multimedia Messaging Service (MMS) is a standard way to send messages that include multimedia content to and from a mobile phone over a cellular network.
44. What is the email attachment size limit in Gmail?
[A] 10 MB
[B] 20 MB
[C] 25 MB
[D] 40 MB
Show Answer
Correct Answer: C [25 MB]
Notes:
Users can send up to 25 MB in attachments. If the file is greater than 25 MB, Gmail automatically adds a Google Drive link in the email instead of including it as an attachment.
45. What do we call a malicious computer program which pretends to be a useful application?
[A] Worms
[B] Trojan horse
[C] Ransomware
[D] Keylogger
Show Answer
Correct Answer: B [Trojan horse]
Notes:
A Trojan horse is a malicious computer program which pretends to be a useful application. Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.
46. What do we call a malicious program that is appended to an application and is triggered by a specific event, such as a logical condition or a specific date and time?
[A] Worm
[B] Adware
[C] Logic bomb
[D] Stealth virus
Show Answer
Correct Answer: C [Logic bomb]
Notes:
A logic bomb is a type of malicious software that is appended to an application and is triggered by a specific event, such as a logical condition or a specific date and time.
47. Which of these is a type of E-banking?
[A] Electronic Bill Payment
[B] CTS
[C] Telephone Banking
[D] All of the above
Show Answer
Correct Answer: D [All of the above]
Notes:
E- Banking stands for Electronic Banking. It includes various services such as Electronic Bill Payments, Cheque Truncation System, M-Banking etc.
48. What is meant by CTS?
[A] Cheque Temporary Stoppage
[B] Clean Technology System
[C] Cheque Truncation System
[D] Clean Termination Scheduling
Show Answer
Correct Answer: C [Cheque Truncation System]
Notes:
Cheque Truncation System (CTS) is a cheque clearing system undertaken by the Reserve Bank of India (RBI) for quicker cheque clearance. As the term proposes, truncation is the course of discontinuing the flow of the physical cheque in its way of clearing.
49. What is the difference between IMPS and NEFT?
[A] IMPS is managed by RBI whereas NEFT is managed by NPCI
[B] IMPS is available 24*7 whereas NEFT is available during NEFT business hours
[C] NEFT is a real time transfer system whereas IMPS is not
[D] None of the above
Show Answer
Correct Answer: B [IMPS is available 24*7 whereas NEFT is available during NEFT business hours]
Notes:
IMPS is managed by NPCI whereas NEFT is managed by RBI. IMPS is available 24*7 whereas NEFT is available during NEFT business hours. IMPS is a real time transfer system whereas NEFT is not.
50. What was “Mosaic” in the initial history of World Wide Web?
[A] Operating System
[B] Web Browser
[C] Computer Virus
[D] Server Application
Show Answer
Correct Answer: B [Web Browser ]
Notes:
Mosaic was one of the first web browsers and the first “popular” web browser with a graphical user interface that could be operated by an average person. It was this browser which accelarted the spread of the internet and resulted in internet boom of 1990s.