Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 2

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 2

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 2 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. Which device consists of electronic circuits that interpret and execute program instructions?
    A. Central processing unit B. Input C. Output D. Pointer E. None of these

2. What is Skylake?
    A. Super Computer B. Hybrid Computer C. Core Processors D. Web browser E. None of these

3. SMPS stands for________.
    A. Switched Mode Power Supply B. Start Mode Power Supply C. Store Mode Power Supply D. Single Mode Power Supply E. None of these

4. BIOS is an abbreviation for ______.
    A. Basic Input/Output Sytem B. Binary synchronous C. Binary digit D. All of the above E. None of these

5. A binary numbers are represented by _______.
    A. Digits 0 and 1 B. Digits 0, 1, ..., 8 C. Digits A,B, C,... D. All of the above E. None of these

Answers and Explanations
1. Answer - Option A
Explanation -
The central processing unit consists of electronic circuits that interpret and execute program instructions, as well as communicate with the input, output, and storage devices.
2. Answer - Option C
Explanation -
Skylake is Intel’s Sixth generation Core Processors.
3. Answer - Option A
Explanation -
A switched-mode power supply (SMPS) is an electronic power supply that incorporates a switching regulator to convert electrical power efficiently. An SMPS transfers power from a source, like mains power, to a load, such as a personal computer, while converting voltage and current characteristics.
4. Answer - Option A
Explanation -
BIOS (basic input/output system) is the program a personal computer's microprocessor uses to get the computer system started after you turn it on.
5. Answer - Option A
Explanation -
A binary number is a number expressed in the binary numeral system which represents numeric values using two different symbols, 0 (zero) and 1 (one).
1. Encryption is related to cryptography in which layer?
    A. Application layer B. Presentation layer C. Network Layer D. Transport layer E. None of these

2. Malicious software is known as ____.
    A. Badware B. Malware C. Malicious ware D. Iiigalware E. None of these

3. Who among the following person has dene the term ‘computer virus’?
    A. Tom Kilburn B. Charles Babbage C. Konrad Zuse D. Frederick Cohen E. None of these

4. Which one of the following is a key function of a firewall?
    A. Monitoring B. Deleting C. Copying D. Moving E. None of these

5. The ability to recover and read deleted or damaged les from a criminal’s computer is an example of a law enforcement specialty called___.
    A. robotics B. simulation C. computer forensics D. animation E. None of these

Answers and Explanations
1. Answer - Option B
Explanation -
Presentation layer serves as translation of data between a networking service and an application, including character encoding, data compression and encryption/decryption.
2. Answer - Option B
Explanation -
Malicious software (malware) is any software that gives partial to full control of your computer to do whatever the malware creator wants. Malware can be a virus, worm, trojan, adware, spyware, rootkit etc.
3. Answer - Option D
Explanation -
Frederick B. Cohen is an American computer scientist and best known as the inventor of computer virus defense techniques. He gave the definition of "computer virus"
4. Answer - Option A
Explanation -
A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.
5. Answer - Option C
Explanation -
Computer forensics is the practice of collecting, analyzing and reporting on digital data in a way that is legally admissible.
Note: It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally.
1. What kind of lock includes a keypad that can be used to control access into areas?
    A. Cipher B. Warded C. Device D. Tumbler E. None of these

2. The database administrator's function in an organization is _____.
    A. to be responsible for the more technical aspects of managing the information contained in organizational databases B. to be responsible for the executive level aspect of decisions regarding the information management C. to show the relationship among entity classes in a data warehouse D. to define which data mining tools must be used to extract data E. None of the above

3. Which of the following is not characteristic of a relational database model?
    A. Tables B. Treelike structure C. Complex logical relationship D. Records E. None of these

4. Every device on the internet has a unique ____ address that identifies it in the same way that a street address identifies the location of a house.
    A. DH B. DA C. IP D. IA E. None of these

5. _______ is a Windows utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
    A. Backup B. Disk cleanup C. Disk defragmenter D. Restore E. Disk restorer

Answers and Explanations
1. Answer - Option A
Explanation -
Cipher locks are used to control access to areas of a facility that are sensitive. e.g airport research and development laboratories areas within financial institutions etc.
A cipher lock may have four of five push buttons depending on the manufacture.
2. Answer - Option A
Explanation -
A database administrator is a person responsible for the design, implementation, maintenance and repair of an organization’s database.
3. Answer - Option B
Explanation -
The basic building block of relational model is table or relation. A table is composed by rows (records) and columns (attributes) related tables are linked with each other using repeated columns. Relational database models can be represented the form of tables and relationship links among them.
4. Answer - Option C
Explanation -
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., Computer, printer) participating in a Computer network that uses the Internet Protocol for communication.
Note: An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is
5. Answer - Option C
Explanation -
Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation.
Note: From Windows 8, the program was renamed to Defragment and Optimize Drives.

Computer Awareness - Related Information
TS CAB Recruitment General Awareness Quiz 9
UPSC NDA and NA General Knowledge
IBPS PO Mains English Language Quiz 1
TS CAB Recruitment Quantitative Aptitude Quiz 6