Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
21. Who among the following developed the LISP programming language family?
[A] Ken Thompson
[B] Donald Knuth
[C] John McCarthy
[D] Von Belt
Show Answer
Correct Answer: C [John McCarthy]
Notes:
John McCarthy was an American computer scientist. McCarthy was one of the founders of the discipline of artificial intelligence. He coined the term “artificial intelligence” and developed the LISP programming language family.
22. What is the name given to the computing infrastructure close to the sources of data?
[A] Edge Computing
[B] Embedded Computing
[C] Encrypted Computing
[D] None of the Above
Show Answer
Correct Answer: A [Edge Computing]
Notes:
Edge computing refers to the computing infrastructure at the edge of the network, close to the sources of data. Edge computing reduces the communications bandwidth needed between sensors and the datacenter.
23. The CAP Theorem concludes that it is not possible for a distributed computer system to provide three guarantees at the same time. Which of the following are among these three guarantees?
[A] Consistency
[B] Availability
[C] Partition Tolerance
[D] All of the Above
Show Answer
Correct Answer: D [All of the Above]
Notes:
The CAP Theorem consists three following terms: Consistency states that each computer node contain all of the same data at the same time. Availability states that each database request is responded to as either successful or failure. Partition tolerance states that the database system continues operating even when not all nodes are connected to one another and suffer communication issues.
24. Which among the following is the term given to the three rules to find logically implied functional dependencies?
[A] Reflexivity Rules
[B] Normalization Rules
[C] W. Armstrong’s Axioms
[D] Closure Rules
Show Answer
Correct Answer: C [W. Armstrong’s Axioms]
Notes:
The three rules given by Armstrong are known as Armstrong’s axioms. It refers to the sound and complete set of inference rules that is used to test logical implication of functional dependencies.
25. In the OSI model, Bridging is performed in which of the following layers?
[A] Layer 7
[B] Data Link Layer
[C] Session Layer
[D] Transport Layer
Show Answer
Correct Answer: B [Data Link Layer]
Notes:
In the OSI model, bridging is performed in the data link layer. A network bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments.
26. What is the full form of NIC?
[A] Network Interface Card
[B] Network Interface Censorship
[C] Node in Connection
[D] All of the Above
Show Answer
Correct Answer: A [Network Interface Card]
Notes:
NIC stands for Network Interface Card. It is used to connect the computer to the external network. It will normally have a PCI connector to connect to one of the PC expansion slots.
27. What are the other names for a Network Interface Card?
[A] LAN adaptor
[B] Network adaptor
[C] Network Card
[D] All of the above
Show Answer
Correct Answer: D [All of the above]
Notes:
A Network Interface Card is circuit board or a card that allows computers to communicate over a network via cables or wirelessly. Every network adaptor is assigned a unique 48-bit Media Access Control address, which is stored in ROM to identify themselves in a network.
28. What do we call the time it takes for an entire message to completely arrive at the destination from the time the first bit is sent out from the source?
[A] Propagation time
[B] Transmission time
[C] Latency
[D] Throughput
Show Answer
Correct Answer: C [Latency]
Notes:
The latency or delay defines how long it takes for an entire message to completely arrive at the destination from the time the first bit is sent out from the source.
29. Which of the following represents a nibble data?
[A] 2 bits
[B] 4 bits
[C] 6 bits
[D] 8 bits
Show Answer
Correct Answer: B [4 bits]
Notes:
Nibble refers to the half of an eight-bit byte or four binary digits. Byte is a group of bits (8 bits) used to represent a character. A byte is considered as the basic unit of measuring memory size in computer.
30. Which of these standards is used to define higher layer LAN protocols?
[A] IEEE 802.15
[B] IEEE 802.11
[C] IEEE 802.7
[D] IEEE 802.1
Show Answer
Correct Answer: D [IEEE 802.1]
Notes:
IEEE 802 standard is a family of IEEE standards dealing with local area networks and metropolitan area networks. IEEE 802.1 deals with higher layer LAN protocols.