Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
21. ACID is a set of properties of database transactions intended to guarantee validity even in the event of errors, power failures etc.What is the full form of ACID?
[A] Aquired Consistency In Database
[B] Atomicity, Consistency, Isolation, Durability
[C] Atomicity,Control,Isolation,Dependency
[D] Atomicity,Concurrecny,Isolation,Durability
Show Answer
Correct Answer: B [Atomicity, Consistency, Isolation, Durability]
Notes:
Andreas Reuter and Theo Harder coined the acronym ACID for Atomicity, Consistency, Isolation, and Durability. In the context of databases, a sequence of database operations that satisfies the ACID properties is called a transaction.
22. What is the full form of RAID?
[A] Redundant Array of Inexpensive Disks
[B] Replicated Array of Independent Data
[C] Redundant Array of Independent Disks
[D] All of the Above
Show Answer
Correct Answer: C [Redundant Array of Independent Disks]
Notes:
RAID stands for Redundant Array of Independent Disks. It is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
23. Which of the following is the name given to the computers on a network?
[A] Point
[B] Server
[C] Nodes
[D] Connection
Show Answer
Correct Answer: C [Nodes]
Notes:
A computer network is a set of connected computers. Computers on a network are called nodes. The connection between computers can be done via cabling, most commonly the Ethernet cable, or wirelessly through radio waves.
24. What is the name given to the technique of connecting computers?
[A] Node
[B] Topology
[C] Architecture
[D] Ring
Show Answer
Correct Answer: B [Topology]
Notes:
Computer networks can be broken down historically into topologies, which is a technique of connecting computers. The most common topology today is a collapsed ring.
25. Which of the following represents bit length?
[A] 2 (Propagation speed * bit duration)
[B] Propagation speed/ bit duration
[C] 1/2 (Propagation speed * bit duration)
[D] Propagation speed * bit duration
Show Answer
Correct Answer: D [Propagation speed * bit duration]
Notes:
The bit length is the distance one bit occupies on the transmission medium. It is given by the formula: Propagation speed * bit duration.
26. Which of these standards is defined by IEEE 802.3ab?
[A] Megabit Ethernet over copper wiring
[B] Gigabit Ethernet over Fiber optics
[C] Gigabit Ethernet over copper wiring
[D] Fast Ethernet
Show Answer
Correct Answer: C [Gigabit Ethernet over copper wiring]
Notes:
IEEE 802.3ab, which is also known as 1000BASE-T, is a standard for Gigabit Ethernet over copper wiring.
27. What is the full form of GSM?
[A] Geographic System for Mobile
[B] Great System of Mobile
[C] Geographic Special Mobile
[D] Global System for Mobile
Show Answer
Correct Answer: D [Global System for Mobile]
Notes:
GSM stands for Global System for Mobile. Before this it was known as Group Special Mobile. As GSM increases its global presence, the term was changed to Global System for Mobile.
28. Which of these protocols is considered as the effective predecessor of the World Wide Web?
[A] LDAP
[B] Gopher
[C] SMTP
[D] SSH
Show Answer
Correct Answer: B [Gopher]
Notes:
The Gopher protocol is an application layer protocol which is designed for distributing, searching, and retrieving documents over the Internet. The Gopher ecosystem is considered as the effective predecessor of the World Wide Web.
29. Which of these terms refer to the technology that is used to effectively double the data transfer speed?
[A] Channel bonding
[B] Bandwidth allocation
[C] Walling
[D] None
Show Answer
Correct Answer: A [Channel bonding]
Notes:
Channel bonding refers to the technology that combines two telephone lines into a single channel, effectively doubling the data transfer speeds. For example, bonding two modems of 56Kbps together would give you a 112 Kbps Internet connection.
30. Which of these devices are used to send the data to a particular destination?
[A] Repeater
[B] Switch
[C] Modem
[D] None of the above
Show Answer
Correct Answer: B [Switch]
Notes:
A switch learns about MAC address connected to each port and will only send data on that port that is addressed to those MAC addresses.