0

GK (Computers)

Description: Increasing the Knowledge of Students in GK field
Number of Questions: 25
Created by:
Tags: General Knowledge Current Affairs GK Current Trends Computer Knowledge
Attempted 0/25 Correct 0 Score 0

The banks use __________ device to minimize conversion process.

  1. Keyboard

  2. MICR

  3. OCR

  4. Scanner


Correct Option: B

When an organization gives contract for development of software, it has to give data to the service provider. In such cases, the ownership of data should _________ .

  1. be transferred to the service provider

  2. be with the client/organization that outsource services

  3. be shared by both parties

  4. not be transferred


Correct Option: B

Which of the following is NOT done by modem?

  1. Transmission Speed

  2. Data Accuracy

  3. Error detection and Correction

  4. Data Compression


Correct Option: B

Under which case will intranet be an effective networking tool/s?

  1. In a distributed decision-making environment

  2. Where heterogeneous applications are involved

  3. In a centralised organization

  4. In a decentralisad organization


Correct Option: C

_________ can' t be used for source of data automation.

  1. POS terminal

  2. OCR

  3. Keyboard

  4. UPC


Correct Option: D

A program coded in programming language is ____________ code.

  1. target

  2. source

  3. block

  4. none of these


Correct Option: B

'Platform' in computer world means ___________.

  1. computer hardware

  2. operating systems

  3. both of these

  4. none of these


Correct Option: C

Which of these biometric tools uses thermal sensors along with infrared rays for identification?

  1. Key stroke dynamics

  2. Lris Retinal scan

  3. Speech recognition

  4. Fingerprint scanning


Correct Option: C

What is NOT a feature of networking?

  1. Reliability

  2. Greater storage space

  3. Connectivity

  4. All are features of networking


Correct Option: D

Which of the following is a disadvantage of distributed database?

  1. Unreliability

  2. Easy implementation

  3. Insecurity

  4. High communication cost


Correct Option: C

What is incorrect about software?

  1. It can manipulate computer.

  2. It has programs and instructions.

  3. Both (1) and (2)

  4. It can be touched


Correct Option: D

Which of the following transmission techniques let computer to alternatiyely send and receive data?

  1. Simplex

  2. Half duplex

  3. Full duplex

  4. Multiplexing


Correct Option: B

A memory that is referred by its contents instead of physical address is called ___________

  1. associative memory

  2. content addressable storage

  3. both (1) and (2)

  4. none of these


Correct Option: B

The most dangerous risk in leaking of information is

  1. ready access to online terminals

  2. online processing of data

  3. ignorance about the existence of risk

  4. all of these


Correct Option: C

A camera is a/an

  1. input device

  2. input or output

  3. processing machine

  4. output machine


Correct Option: B

Taking back-up of a file against crash is a

  1. preventive measure

  2. curative measure

  3. decisive measure

  4. none of these


Correct Option: B

A modem performs _________

  1. modulation

  2. demodulation

  3. data compression

  4. all of these


Correct Option: D

Using anti-virus software is a

  1. preventive measure

  2. detective measure

  3. corrective measure

  4. all the above


Correct Option: A

An online transaction is

  1. done in real time

  2. done via internet

  3. done via telephone

  4. none of these


Correct Option: B

Which can not assure data accuracy in an application?

  1. Limit and reasonableness test

  2. Echo checking

  3. Control total

  4. None of these


Correct Option: A

To stop unauthorized access to the computer system, we should have a

  1. trustworthy system administrator

  2. good password policy

  3. sound encryption policy

  4. all of the above


Correct Option: B

A clerk in a bank has to access data in customer account. The logical access control for these users would be with

  1. use of individual passwords

  2. use of a Accounts Receivable Section password

  3. use of individual passwords plus separate access passwords for customer data and product data

  4. Can't say


Correct Option: A

John Von Neumann developed

  1. first electronic chip flip flop

  2. stored-program concept

  3. the first computer

  4. none of these


Correct Option: A

Maximum storage space is available on

  1. CDs

  2. ROM

  3. Hard disks

  4. Floppies


Correct Option: C

Which of the following is single user computer with many features and good processing power?

  1. Minicomputer

  2. Workstation

  3. Macintosh

  4. None of these


Correct Option: B
- Hide questions