Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 5

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 5

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 5 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. The scrambling of code is known as_____.
    A. encryption B. a firewall C. scrambling D. password-proofing E. None of these

2. _______ may be included in other folder while making hierarchical structure folder
    A. Mini folder B. Tiered folder C. Sub-folder D. Object E. None of these

3. File extension is used ____.
    A. for naming the file. B. to ascertain that file name is not lost C. to identify file D. to identify file type E. to make items complex

4. ISDN stands for ____.
    A. Integral Service Dynamic Network B. International Subscriber Dialup Network C. International Service Digital Network D. Integrated Services Digital Network E. None of these

5. Which protocol does Ping use?
    A. TCP B. ARP C. ICMP D. BootP E. None of these

Answers and Explanations
1. Answer - Option A
Explanation -
The scrambling of code is known as encryption. It is the process of converting information or data into a code, especially to prevent unauthorized access.
2. Answer - Option C
Explanation -
A folder which is contained in another folder is called a sub-folder.
3. Answer - Option D
Explanation -
File extension is used to identify file type, often separated from the base filename (by, e.g., a dot, a space), that indicates, e.g., the encoding (file format), the usage, of a computer file.
4. Answer - Option D
Explanation -
ISDN stands for Integrated Services Digital Network. It is a design for a completely digital telephone/telecommunications network. It is designed to carry voice, data, images, video, everything you could ever need.
5. Answer - Option C
Explanation -
Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply.
Note:- Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer and back.
1. What is the name of the logic circuit which can add two binary digits?
    A. half adder B. full adder C. parallel adder D. serial adder E. None of these

2. In addition to keying data directly into a database, data entry can be done from a(n) ___.
    A. input form B. Table C. Field D. data dictionary E. None of these

3. A remote data entry means____.
    A. Program resides in master computer and data is read from remote terminal B. Both program and data are read from remote terminal C. Both program and data are read from computer terminal D. All of these E. None of these

4. Step by step instructions written to solve any problem is called _________.
    A. pseducode B. algorithm C. assembler D. class View E. None of these

5. Which protocol provides e-mail facility among different hosts?
    A. FTP B. SMTP C. TELNET D. SNMP E. None of these

Answers and Explanations
1. Answer - Option A
Explanation -
A half adder is a logical circuit that performs an addition operation on two binary digits. The half adder produces a sum and a carry value which are both binary digits.
2. Answer - Option A
Explanation -
In addition to keying data directly into a database, data entry can be done from an input form with the help of input device such as keyboard, mouse and touch screen or through speech recognition software.
3. Answer - Option A
Explanation -
Remote data entry refers to accessing your local database remotely. In this program resides on local database and data is collected from remote computers.
4. Answer - Option B
Explanation -
An algorithm is a self-contained step-by-step set of operations to be performed. Algorithms exist that perform calculation, data processing and automated reasoning.
5. Answer - Option B
Explanation -
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321—which is the protocol in widespread use today. SMTP by default uses TCP port 25.
1. What is the full form of CMOS?
    A. Content Metal Oxide Semiconductor B. Complementary Metal Oxide Semiconductor C. Complementary Metal Oxygen Semiconductor D. Complementary Metal Oscilator Semiconductor E. None of these

2. In the formula, = B1/B2 + B3, which of the following is the correct precedence?
    A. Addition higher precedence than division B. Equal precedence among the two operators: proceed right to left C. Equal precedence among the two operators proceed left to right D. Division higher precedence than addition E. None of these

3. The altering of data so that it is not usable unless the changes are undone is ____.
    A. Biometrics B. Compression C. Encryption D. Ergonomics E. None of these

4. What is the full form of RTF?
    A. Richer Text Formatting B. Rich Text Format C. Right Text Fishing D. Right Text Font E. None of these

5. Which American computer company is called Big Blue?
    A.Microsoft B. Compaq Corp C. IBM D. Tandy Svenson E. None of these

Answers and Explanations
1. Answer - Option B
Explanation -
Complementary metal oxide semiconductor (CMOS) is a technology for constructing integrated circuits. CMOS technology is used in microprocessors, microcontrollers, static RAM and other digital logic circuits.
2. Answer - Option D
Explanation -
In the excel, the formula = B1/B2 + B3 means Division higher precedence than addition.
3. Answer - Option C
Explanation -
Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor.
4. Answer - Option B
Explanation -
RTF (Rich Text Format) is a text file format used by Microsoft products, such as Word and Office and developed by Microsoft in 1987 for use in their products and for cross-platform document interchange. RTF files support text style formatting, as well as images within the text.
Note: RTF files can be converted into a different format by changing the formatting selection when saving the word document.
5. Answer - Option C
Explanation -
International Business Machines Corporation (IBM) is an American multinational technology and consulting corporation with headquarters in Armonk, New York is also called the Big Blue.

Related Information
Computer Aptitude Important Terms
IBPS PO General Awareness Quiz 1
Current Affairs Quiz October 2019