Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 15

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 15

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 15 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. Which of the following transactions requires maximum security?
    A. Error correction codes B. Master file manipulation C. Batch control/transactions D. Normal transactions E. None of these

2. Which of the following can be determined only from the meaning of the attributes in the entity type______.
    A. Domain B. Cardinality C. Key D. Relation E. Constraint

3. One of the more recent e-mail scams, which lures internet users into revealing personal information is referred to as _____.
    A. A phishing B. flaming C. blogging D. pop- ups E. None of these

4. ________ is a full form of SQL.
    A. Standard query language B. Sequential query language C. Structured query language D. Server side query language E. None of these

5. In MS-Excel, all formula starts with the sign of______.
    A. # B. @ C. = D. + E. None of these

Answers and Explanations
1. Answer - Option B
Explanation -
Master file manipulations require maximum security. High level security access controls should be placed to check the authority and authenticity of the individuals or processes making manipulation to master files.
2. Answer - Option C
Explanation -
A key is an attribute or a collection of attributes whose value uniquely identify an entity an entity in the entity set, keys can be determined only from the meaning of the attributes in the entity type.
3. Answer - Option A
Explanation -
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.
4. Answer - Option C
Explanation -
SQL (Structured Query Language) is a standard interactive and programming language for getting information from and updating a database.
5. Answer - Option C
Explanation -
In Excel Formulas are equations that can perform calculations, return information, manipulate the contents of other cells, test conditions and more. A formula always starts with an equal sign (=).
1. Who invented the language ‘C ‘?
    A. Dennis M. Ritchie B. Niklaus Writh C. Seymour Papert D. Donald Kunth E. None of these

2. ____ controls the way in which the computer system functions and provides a means by which users can interact with the computer
    A. The platform B. Application software C. Operating system D. The motherboard E. None of these

3. Artificial intelligence can be used in every sphere of life because of its ______.
    A. Ability of work in hazardous places B. Ability of think like human beings C. Ability of work in artificial environment D. All of the above E. None of these

4. ______ services are available free at portals on the Web.
    A. E-mail B. FTP C. Video-conferencing D. Telephone E. All of these

5. The amount of time required by a storage device to retrieve data and programs is its____.
    A. retrieval speed B. capacity C. memory D. storage E. access speed

Answers and Explanations
1. Answer - Option A
Explanation -
Dennis MacAlistair Ritchie was an American computer scientist. He created the C programming language.
2. Answer - Option C
Explanation -
An operating system is system software that manages computer hardware and software resources and provides common services for computer programs.
3. Answer - Option B
Explanation -
Artificial intelligence is a term used to describe system or machine that mimic the cognitive functions of human mind,such as learning and problem solving.
4. Answer - Option A
Explanation -
Electronic mail, most commonly referred to as email or e-mail since around 1993, is a method of exchanging digital messages from an author to one or more recipients. Email operates across the Internet or other computer networks.
5. Answer - Option E
Explanation -
Access Speed is the average amount of time it takes for a floppy drive, hard drive, CD drive, or other drive to find any particular piece of data on a disk and send it to your PC.
Note: Access speed is typically listed in milliseconds (ms).
1. _______ is a Windows utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations
    A. Backup B. Disk cleanup C. Disk defragmenter D. Restore E. Disk restorer

2. Which of the following file name extension suggests that the file is Backup copy of another file?
    A. TXT B. COM C. BAS D. BAK E. None of these

3. SAP is an identifying label for network endpoints used in Open Systems Interconnection (OSI) networking. what is the meaning of ‘SAP’?
    A. Smart Access Point B. Service Access Point C. Service At Point D. Service Access Permission E. None of these

4. What is the name of the chip which has more than one processor on it?
    A. Parallel chip B. Multi -processor chip C. Transputer D. Parallel processor E. None of these

5. What kind of lock includes a keypad that can be used to control access into areas?
    A. Cipher B. Warded C. Device D. Tumbler E. None of these

Answers and Explanations
1. Answer - Option C
Explanation -
Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation.
Note: From Windows 8, the program was renamed to Defragment and Optimize Drives.
2. Answer - Option D
Explanation -
'.BAK' is a file name extension used to signify a backup copy of a file. This common ‘.bak’ the naming scheme makes it possible to retrieve the original contents of the file.
3. Answer - Option B
Explanation -
SAP is one of the largest vendors of enterprise resource planning (ERP) software and related enterprise applications. The company's ERP system enables its customers to run their business processes, including accounting, sales, production, human resources and finance, in an integrated environment.
4. Answer - Option B
Explanation -
Multi- processor chip involves more than one processor placed on a single chip. CMP as compared to uni-processor fills up processor die with multiple relatively simpler processor cores in steal of just huge core.
Note: The transputer was a pioneering microprocessor architecture of the 1980s, featuring integrated memory and serial communication links, intended for parallel computing.
5. Answer - Option A
Explanation -
Cipher locks are used to control access to areas of a facility that are sensitive. e.g airport research and development laboratories areas within financial institutions etc.
A cipher lock may have four of five push buttons depending on the manufacture.

Related Information
IBPS Clerk Recruitment - Reasoning Ability Quiz Sets
Quantitative Aptitude - Simplification Quiz Sets