Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 16

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 16

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 16 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. What is backup?
    A. Adding more components to your network B. Protecting data by copying it from the original source to a different destination C. Filtering old data from the new data D. Accessing data on tape

Answer - Option B
Explanation - Backup refers to the process of making copies of data or data files from the original source to a different destination to use in the event the original data or data files are lost or destroyed.
2. To send another station a message, the main thing a user has to know ____.
    A. how the network works B. the other station's address C. whether the network is packet-switched or circuit-switched D. whether this is a voice or data network

Answer - Option B
Explanation - To send the message to any other station the user must know the other station address.
3. Fence register is used for ___.
    A. CPU protection B. Memory protection C. File protection D. All of the above

Answer - Option B
Explanation - The main goal of fence protection is to prevent a user program from destroying any of the operating system code that is resident is the main memory. In order to achieve protection a hardware register called the fence register.
Note: This register contains the address of the end of the operating system.
4. Which of the following refers to restarting the system when it is already powered on?
    A. Hibernation B. A cold boot C. Standby mode D. A warm boot

Answer - Option D
Explanation - Warm boot refers to the boot process in which a system regains its initial state without hampering the power source.
It means you’re initiating a reset command by pressing the Ctrl, Alt and Delete key combination simultaneously.
You can also perform a warm boot by clicking on the “Restart” button on the Start menu.
5. Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?
    A. EPROM B. The registers C. Extended memory D. RAM

Answer - Option D
Explanation - Most operating Systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.
Note:- Virtual memory works by swapping programs between memory and one or more disk devices - a concept called paging.
1. A word in a web page that, when clicked, opens another document_____.
    A. Anchor B. Hyperlink C. Reference D. URL

Answer - Option B
Explanation - In computing, a hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering.
Note:- A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks.
2. A button that makes character either upper or lower case and numbers to symbols
    A. Monitor B. Shift key C. Icon D. Mouse

Answer - Option B
Explanation - Shift key used to type capital letters and other alternate "upper" characters. There are typically two shift keys, on the left and right sides of the row below the home row. The shift key's name originated from the typewriter, where one had to press and hold the button to shift up the case stamp to change to capital letters.
3. Hardware devices that are not part of the main computer system and are often added later to the system are_________.
    A. clip art B. Highlight C. Execute D. peripherals

Answer - Option D
Explanation - A peripheral device is generally defined as any auxiliary device such as a computer mouse or keyboard that connects to and works with the computer in some way.
Note:- Other examples of peripherals are image scanners, tape drives, microphones, loudspeakers, webcams, and digital cameras.
4. The word FTP stands for____.
    A. File Transfer Protection B. File Transit Protocol C. File Typing Protocol D. File Transfer Protocol

Answer - Option D
Explanation - The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network such as the Internet.
5. A _____ is a device that not only provides surge protection but also furnishes your computer with battery backup power during a power outage.
    A. Surge strip B. USB C. UPS D. Battery strip

Answer - Option C
Explanation - UPS (Uninterrupted power supply) is a back-up power supply that in case of power failure or fluctuations allows enough time for an orderly shutdown of the system or for stand by generator to start up.
1. ________ is a windows utility program that locates and eliminates unnecessary fragments and rearranges filed and unused disk space to optimize operations
    A. Backup B. Disk cleanup C. Disk defragmenter D. Restore

Answer - Option C
Explanation - Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations.
2. In most WANs, the network contains numerous cables of telephone lines, each one connecting a pair of ____.
    A. Packet B. Star topology C. Router D. Antennas

Answer - Option C
Explanation - WAN spans a large geographical area. Often a country or continent. The host are connected by a communication subnet. This subnet consists of 2 distinct components : Transmission lines and switching elements. So.it WAN’s the network numerous cables of telephone lines. Each one connecting a pair of routers if two routers that do not share a cable nevertheless with to communicate they must do this indirectly.
3. What does COB stands in COBOL?
    A. Common Object B. Common Business C. Common Operating D. Computer Oriented

Answer - Option B
Explanation - COBOL stands for Common Business Oriented Language.The US Department of Defense, in a conference, formed CODASYL (Conference on Data Systems Language) to develop a language for business data processing needs which is now known as COBOL.
4. The ________ key in a relational database links one table to another.
    A. Relational B. Operational C. Linker D. Foreign

Answer - Option D
Explanation - Foreign keyis a field in one table that uniquely identifies a row of another table. In other words, a foreign key is a column or a combination of columns that is used to establish and enforce a link between two tables.
5. The _______ translates internet domain and host names to IP address
    A. File transfer protocol B. DNS C. Network Time Protocol D. Internet Relay chat

Answer - Option B
Explanation - The Domain Name System is used to translate Internet domain and host names to IP addresses. It uses a distributed database to store the combination of name and address information.
Note: DNS converts the domain names we type in our Web browser address bar to the IP addresses with the help of a name server.

Related Information
IBPS Clerk Recruitment - Reasoning Ability Quiz Sets
Quantitative Aptitude - Simplification Quiz Sets