Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
11. Who among the following is the father of MySQL?
[A] Charles Babbage
[B] Michael Wideneus
[C] Allen Jobs
[D] Madam Kama
Show Answer
Correct Answer: B [Michael Wideneus]
Notes:
Michael Widenius is known as the Father of MySQL. He is the main author of the original version of the open-source MySQL database and a founding member of the MySQL AB company.
12. There is a situation in which resources are held by two or more connections that are each needed by the other connections. What is the name given to such a situation?
[A] Deadlock
[B] Debugging
[C] Instance
[D] Remote Procedure Call
Show Answer
Correct Answer: A [Deadlock]
Notes:
Deadlock is a situation in which resources are held by two or more connections that are each needed by the other connections so that they are stuck in an infinite wait loop.
13. What is the name given to the situation where the lock waits only for a specified amount of time for another lock to be released?
[A] Wait Around
[B] Timeout
[C] Lock Timeout
[D] Wait Wound
Show Answer
Correct Answer: C [Lock Timeout]
Notes:
The Lock Timeout event class indicates that a request for a lock on a resource. It has timed out because another transaction is holding a blocking lock on the required resource.
14. Which of the following networking is used when centralized management is desired or if there is little room for cabling?
[A] Local Area Networking
[B] Wide Area Networking
[C] Passive Optical Local Area Networking
[D] Optical Area Networking
Show Answer
Correct Answer: C [Passive Optical Local Area Networking]
Notes:
Passive optical LANs or POLANs are adapted to indoor network architectures, and can decrease the amount of cable and equipment required to deploy a network. POLANs are ideal if there is little room for cabling.
15. Which among the following correctly defines a Wide Area Network?
[A] A Wide Area Network is quite bigger network than the LAN.
[B] The internet is one of the biggest WAN in the world.
[C] In a WAN network, messages are transmitted fast.
[D] All of the Above
Show Answer
Correct Answer: D [All of the Above]
Notes:
A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fiber optic cable or satellite links.
16. What is the full form of HIDS?
[A] Host Based Intrusion Detection System
[B] Housing Intruder Detection System
[C] Host In Device Server
[D] None of the Above.
Show Answer
Correct Answer: A [Host Based Intrusion Detection System]
Notes:
A host-based intrusion detection system is an intrusion detection system that is capable of monitoring and analyzing the internals of a computing system as well as the network packets on its network interfaces.
17. Which of the following represents Latency?
[A] propagation time +transmission time +queuing time + processing delay
[B] propagation time – transmission time +queuing time + processing delay
[C] propagation time +transmission time +queuing time – processing delay
[D] (propagation time +transmission time) – (queuing time + processing delay)
Show Answer
Correct Answer: A [propagation time +transmission time +queuing time + processing delay]
Notes:
It can be said that the Latency is made of four components: propagation time, transmission time, queuing time and processing delay. Latency =propagation time +transmission time +queuing time + processing delay
18. Which of the following hardware device is essential for a computer to connect to a wireless network?
[A] Graphics card
[B] Wireless Printer
[C] Wireless adapter
[D] None of the above
Show Answer
Correct Answer: C [Wireless adapter]
Notes:
Wireless adapters are those hardware devices which are installed inside computers to enable wireless connectivity. If a computer does not have a wireless adapter, it will not be able to connect to a router in order to access the Internet.
19. What is the name of the first computer virus, that affected ARPANET?
[A] Mayhem
[B] Creeper
[C] Boom
[D] Attack
Show Answer
Correct Answer: B [Creeper]
Notes:
Creeper is the first network computer virus, which infected Arpanet in 1971. Bob Thomas created Creeper as an experimental self-duplicating program that was intended not to inflict damage on, but to illustrate a mobile application.
20. Which of these protocols is considered as the effective predecessor of the World Wide Web?
[A] LDAP
[B] Gopher
[C] SMTP
[D] SSH
Show Answer
Correct Answer: B [Gopher]
Notes:
The Gopher protocol is an application layer protocol which is designed for distributing, searching, and retrieving documents over the Internet. The Gopher ecosystem is considered as the effective predecessor of the World Wide Web.
Advertisement