Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 6

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 6

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 6 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. A spooler is a(n)_____.
    A. location in memory that maintains the contents of a document until it prints out. B. print job. C. program that coordinates the print jobs that are waiting to print. D. message sent from the printer to the operating system when a print job is completed. E. None of these

2. Any Hardware component that allows you to enter data or instructions into a computer is called a(n) ______.
    A. Printer B. storage device C. output device D. system unit E. input device

3. A _________ is a design tool that graphically shows the logic in a solution algorithm.
    A. Flowchart B. Hierarchy chart C. Structure chart D. Context diagram E. None of these

4. The operating system is the most common type of ______software.
    A. Communication B. Application C. System D. Word-processing E. None of these

5. Which of the following refers to restarting the system when it is already powered on?
    A. A strong boot B. Hibernation C. A cold boot D. Standby mode E. A warm boot

Answers and Explanations
1. Answer - Option C
Explanation -
A program that controls spooling putting jobs on a queue and taking them off one at a time. Most operating systems come with one or more spoolers, such as a print spooler for spooling documents. In addition, some applications include spoolers.
2. Answer - Option E
Explanation -
In computing, an input device is a peripheral (piece of computer Hardware equipment) used to provide data and control signals to an information processing system such as a computer or information appliance. Examples of input devices include keyboards, mice, scanners, digital cameras and joysticks.
3. Answer - Option A
Explanation -
A flowchart is a picture of the separate steps of a process in sequential order. Note: Flowcharts can provide a step-by-step diagram for mapping out complex situations, such as programming code or troubleshooting problems with a computer.
4. Answer - Option C
Explanation -
An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.
5. Answer - Option E
Explanation -
Warm boot refers to the boot process in which a system regains its initial state without hampering the power source.
It means you’re initiating a reset command by pressing the Ctrl, Alt and Delete key combination simultaneously.
You can also perform a warm boot by clicking on the “Restart” button on the Start menu.
1. Software/Hardware that is designed to protect the computer network against any unauthorized access is called:
    A. Hacker proof program B. Firewall C. Hacker resistant server D. Encryption safe wall E. None of these

2. Which protocol provides e-mail facility among different hosts?
    A. FTP B. SMTP C. TELNET D. SNMP E. None of these

3. Junk e-mail is also called
    A. Spam B. Spoof C. Sniffer script D. Spool E. None of these

4. The browser's____keeps a list of web pages you have visited during the current session
    A. history B. cache C. favorites D. trail E. None of these

5. Which layer of the OSI model performs segmentation of a data stream?
    A. Application layer B. Network layer C. Physical layer D. Transport layer E. Presentation layer

Answers and Explanations
1. Answer - Option B
Explanation -
  • Software/Hardware that is designed to protect the computer network against any unauthorized access is called a Firewall.

  • A firewall assists in establishing a barrier between a trusted network and untrusted external network like the Internet.

  • A firewall is generally of two types:
      1. Network Firewall 2. Host-Based Firewall

  • So, option B is the correct answer.

  • 2. Answer - Option B
    Explanation -
    Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321—which is the protocol in widespread use today. SMTP by default uses TCP port 25.
    3. Answer - Option A
    Explanation -
    Spam is unsolicited commercial junk e-mail sent to large number of email address.
    4. Answer - Option A
    Explanation -
    Browsing history is comprised of a record of Web pages that you have visited in past browsing sessions and typically includes the name of the Web page/site as well as its corresponding URL.
    5. Answer - Option D
    Explanation -
    The Transport layer receives large data streams from the upper layers and breaks these up into smaller pieces called segments.
    Note:- For reliable connections, a transmission may be sent or arrive in the form of packets called segments that need to be reconstructed into a complete massage at the other end.
    1. Sending an e-mail is similar to _________.
      A. Petering an event B. Narrating a store C. Writing a letter D. Creating a drawing E. None of these

    2. Speed of Laser Printer is measured in _____.
      A. LPM B. PPM C. DPI D. DPS E. None of these

    3. Verification of a login name and password is known as_____.
      A. configuration B. accessibility C. authentication D. logging in E. None of these

    4. The process of a computer receiving information from a server on the Internet is known as _____.
      A. pulling B. pushing C. downloading D. transferring E. None of these

    5. Most mail programs automatically complete the following two parts in an e-mail
      A. From : and Body : B. From : and Date : C. From : and To : D. From : and Subject : E. None of these

    Answers and Explanations
    1. Answer - Option C
    Explanation -
    Creating and sending an e-mail message is in many ways similar to writing a letter without a stamp.
    2. Answer - Option B
    Explanation -
    The speed of laser printers ranges from about 4 to 20 pages of text per minute (ppm). A typical rate of 6 ppm is equivalent to about 40 characters per second (cps).
    3. Answer - Option C
    Explanation -
    Authentication is a process in which the credentials provided are compared to those on file in a database of authorized users' information on a local operating system or within an authentication server.
    4. Answer - Option C
    Explanation -
    In computer networks, to download means to receive data to a local system from a remote system or to initiate such a data transfer. Examples of a remote system from which a download might be performed include a web server, FTP server, email server, or other similar systems.
    5. Answer - Option B
    Explanation -
    Most mail programs automatically complete the following two parts in an e-mail From: and Date :

    Related Information
    Computer Aptitude Important Terms
    IBPS PO General Awareness Quiz 5
    Syllogism Practice Quiz 6