Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 11

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 11

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 11 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. A computer used at supermarkets, departmental stores and restaurant etc is called ______ terminal
    A. P-O-S B. Dumb C. Intelligent D. Smart E. Calculating

2. Which of these languages uses a two-step compilation process both interpreter and compiler?
    A. COBOL B. BASIC C. Java D. C++ E. All of these

3. To change the name of an Excel worksheet _____.
    A. Click on the worksheet tab by holding CTRL key and type a new name B. Choose Save option from file menu C. Add a (?) at the end of filename while saving the workbook D. Press CTRL + SHIFT keys and new name E. Double click at the worksheet tab and type a new name

4. Which of the following is a function of the control unit?
    A. Read instructions B. Execute instructions C. Interpret instructions D. Direct operations E. None of these

5. Which of the following is not used as a blogging platform?
    A. Type-pad B. Pinterest C. Blogger D. WordPress E. None of these

Answers and Explanations
1. Answer - Option A
Explanation -
A point-of-sale (POS) terminal is a computerized replacement for a cash register. Much more complex than the cash registers of even just a few years ago, the POS system can include the ability to record and track customer orders, process credit and debit cards, connect to other systems in a network, and manage inventory.
Note:- Generally, a POS terminal has as its core a personal computer, which is provided with application-specific programs and I/O devices for the particular environment in which it will serve.
A POS system for a restaurant, for example, is likely to have all menu items stored in a database that can be queried for information in a number of ways.
2. Answer - Option C
Explanation -
Java uses a two-step compilation process. Java uses a compiler to convert source code into byte code. This byte code is not a machine code. Later for execution JVM platform uses an interpreter to convert these byte-codes into machine language.
3. Answer - Option E
Explanation -
Double-click on one of the existing worksheet names. Right-click on an existing worksheet name, then choose Rename from the resulting Context menu. Select the worksheet you want to rename (click on the worksheet tab) and then select the Sheet option from the Format menu.
4. Answer - Option D
Explanation -
The control unit (CU) is a component of a computer's central processing unit that directs operation of the processor. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions.
5. Answer - Option B
Explanation -
Pinterest is called as Social Network Site for sharing the Articles.
Note: Blogging software is the program used to create blogs.
1. After you’ve opened a window, the button that displays the window over the entire screen is ______.
    A. Scroll box B. Downsize C. Restore down D. Minimize E. Maximize

2. ________is the science and art of transforming messages to make them secure and immune to attacks.
    A. Cryptography B. Cryptoanalysis C. Cryptology D. cryptoanarchy E. Cryptoanalytics

3. Each Excel le is called a workbook because of ____.
    A. It can contain text and data B. It can be modified C. It can contain many sheets including worksheets and chart sheets D. You have to work hard to create it E. None of these

4. Computer instructions written with the use of English words instead of binary machine code is called ____.
    A. Mnemonics B. Symbolic code C. Gray codes D. Opcode E. None of these

5. A _______ shares hardware, software and data among authorized users.
    A. network B. protocol C. hyperlink D. transmitter E. None of these

Answers and Explanations
1. Answer - Option E
Explanation -
After you’ve opened a window, you can maximize it to display full-screen. You can also minimize it so that it disappears from the desktop.
2. Answer - Option A
Explanation -
Cryptographyis the science of providing security for information. It has been used historically as a means of providing secure communication between individuals, government agencies and military forces. Today, cryptography is a cornerstone of the modern security technologies used to protect information and resources on both open and closed networks.
3. Answer - Option C
Explanation -
Each Excel file is called a workbook because it can contain many sheets including worksheets and chart sheets.
4. Answer - Option B
Explanation -
Symbolic code is a program code unrelated to the hardware of a particular computer and requiring conversion to the code used by the computer before the program can be used.
5. Answer - Option A
Explanation -
In computer networks, networked computing devices exchange data with each other along network links (data connections). The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet.
1. What is a person called who uses a computer to cause harm to people or destroy critical systems?
    A. Cyber-terrorist B. Black-hat hacker C. Cyber Cracker D. Hacktivist E. None of these

2. Which of the following is used with databases?
    A. Data mining B. EDI C. Credit cards D. All of the above E. None of the these

3. The _________folder retains copies of message that you have started but are not yet ready to send.
    A. Inbox B. Outbox C. Drafts D. Sent Items E. Address Book

4. The secret code that restricts entry to some programs______.
    A. password B. passport C. entry-code D. access-code E. None of these

5. An e-mail address typically consists of a user ID followed by the _______sign and the name of the e-mail server that manages the user’s electronic post office box
    A. @ B. # C. & D. * E. None of these

Answers and Explanations
1. Answer - Option A
Explanation -
Cyber-terrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
2. Answer - Option A
Explanation -
Data mining is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems.
Note: The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use.
3. Answer - Option C
Explanation -
A draft is simply an email message you haven’t yet sent. It’s not the same thing as an email waiting to be sent.
4. Answer - Option A
Explanation -
A password is the secret code that restricts entry to some programs. It is a without spaced sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user.
5. Answer - Option A
Explanation -
An e-mail address typically consists of a user ID followed by @ the sign and the name of the e-mail server that manages the user’s electronic post office box.

Related Information
Blood Relations Quiz 16
IBPS SO Banking Awareness Quiz 1
IBPS SO General Awareness Quiz 2
SSC CPO Quantitative Aptitude Quiz 8