Computers and IT MCQs
Computer Awareness Questions and Quiz for Banking, IBPS, RRB, RBI, SBI, NABARD examinations of 2024-2025. Computer Awareness MCQs for Competitive Exams. GKToday Computer Awareness for IBPS PO, IBPS Clerk, Bank PO, Bank Clerk and other entrance / competitive examinations.
21. What is the name given to the malicious software that is considered to fall between normal software and a virus?
[A] Spyware
[B] Greyware
[C] Malware
[D] Spam
Show Answer
Correct Answer: B [Greyware]
Notes:
Greyware is a term for which all other malicious software such as adware, spyware, trackware, and other malicious code and malicious shareware fall under.
22. Who among the following invented the FORTRAN language?
[A] J.W.Backus
[B] Steff Warner
[C] Von Neuman
[D] All of the Above
Show Answer
Correct Answer: A [J.W.Backus]
Notes:
John Warner Backus was an American computer scientist. He invented and implemented FORTRAN which is the first widely used high- level programming language. He was the inventor of the Backus–Naur form (BNF).
23. Which of the following programming languages is designed to connect simple HTML pages to a database?
[A] FORTRAN
[B] Cold Fusion
[C] Phython
[D] ASP
Show Answer
Correct Answer: B [Cold Fusion]
Notes:
ColdFusion Markup Language is commonly known as CFML. It is a scripting language for web development.CFML augments standard HTML files with database commands, conditional operators, high-level formatting functions, and other elements to produce web applications.
24. Which of the following is the final step when it has determined that a transaction has been completed successfully?
[A] Rollback
[B] Commit
[C] Transit
[D] None of the Above
Show Answer
Correct Answer: B [Commit]
Notes:
A commit is the final step in the successful completion of a previously started database change as part of handling a transaction in a computing system.
25. What is the name given to the computing infrastructure close to the sources of data?
[A] Edge Computing
[B] Embedded Computing
[C] Encrypted Computing
[D] None of the Above
Show Answer
Correct Answer: A [Edge Computing]
Notes:
Edge computing refers to the computing infrastructure at the edge of the network, close to the sources of data. Edge computing reduces the communications bandwidth needed between sensors and the datacenter.
26. The CAP Theorem concludes that it is not possible for a distributed computer system to provide three guarantees at the same time. Which of the following are among these three guarantees?
[A] Consistency
[B] Availability
[C] Partition Tolerance
[D] All of the Above
Show Answer
Correct Answer: D [All of the Above]
Notes:
The CAP Theorem consists three following terms: Consistency states that each computer node contain all of the same data at the same time. Availability states that each database request is responded to as either successful or failure. Partition tolerance states that the database system continues operating even when not all nodes are connected to one another and suffer communication issues.
27. Which among the following is the term given to the three rules to find logically implied functional dependencies?
[A] Reflexivity Rules
[B] Normalization Rules
[C] W. Armstrong’s Axioms
[D] Closure Rules
Show Answer
Correct Answer: C [W. Armstrong’s Axioms]
Notes:
The three rules given by Armstrong are known as Armstrong’s axioms. It refers to the sound and complete set of inference rules that is used to test logical implication of functional dependencies.
28. Which one of the following is the first scientist to bring the idea of Personal Area Network?
[A] Nickey Jobs
[B] Hardley Jesley
[C] Thomas Zimmerman
[D] None of the Above
Show Answer
Correct Answer: C [Thomas Zimmerman]
Notes:
Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area Network. Personal Area Network covers an area of 30 feet
29. Which of the following hubs can store, amplify, split and retransmit the received signals?
[A] Passive Hub
[B] Active Hub
[C] Intelligent Hub
[D] All of the Above
Show Answer
Correct Answer: B [Active Hub]
Notes:
Active hub can store, amplify, split and retransmit the received signals. It requires additional electronic circuit for performing different functions.
30. Which one of the following routers sits on the periphery of the network?
[A] Core Router
[B] Access Router
[C] Edge Router
[D] Both b and c
Show Answer
Correct Answer: D [Both b and c]
Notes:
An access router is a router that sits at the periphery of a network. It is also known as edge router. It Contrast with “core router,” which is a router that resides in the middle of the network.