Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 7

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 7

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 7 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. The blinking symbol on the computer screen is called the _____.
    A. Mouse B. Hand C. Light D. Cursor E. None of these

2. What is a computer connected to two networks?
    A. link B. server C. gateway D. bridge E. None of these

3. The _______ translates internet domain and host names to IP address
    A. File transfer protocol B. DNS C. Network Time Protocol D. Internet Relay chat E. None of these

4. Which is the full form of VoIP?
    A. Voice of Internet Power B. Voice on Internet Protocol C. Voice over Internet Protocol D. Very optimized Internet Protocol E. None of these

5. In half duplex mode _______.
    A. All stations can only transmit the data at a time. B. All the stations can only receive the data at a time C. All the stations in the network may transmit or receive but at different times D. All the stations in the network may transmit or receive at the same time E. None of these

Answers and Explanations
1. Answer - Option D
Explanation -
The cursor is a movable, sometimes blinking, symbol used to indicate where data may be input on a computer screen.
2. Answer - Option D
Explanation -
A bridge joins two similar types of networks so that they look like one network. The word transparent is often used with bridges because network clients do not know the bridge is even in place.
A gateway joins two dissimilar networks.
3. Answer - Option B
Explanation -
The Domain Name System is used to translate Internet domain and host names to IP addresses. It uses a distributed database to store the combination of name and address information.
Note: DNS converts the domain names we type in our Web browser address bar to the IP addresses with the help of a name server.
4. Answer - Option C
Explanation -
Voice over Internet Protocol (Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
5. Answer - Option C
Explanation -
Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time.
Note: For example, on a local area network using a technology that has half-duplex transmission, one workstation can send data on the line and then immediately receive data on the line from the same direction in which data was just transmitted.
1. The digital telecommunications term ISDN is an abbreviation for ______.
    A. Integrated Standard Digital Networks B. Internet Services Data Network C. Interactive Standard Dynamic Networks D. Integrated Services Digital Network E. None of these

2. The type of software that controls the internal operations in the computer, and controls how the computer words with all its parts is which of the following?
    A. Shareware B. Operating system software C. Application software D. Public domain software E. None of the above

3. Which of the following uses a handheld operating system?
    A. A supercomputer B. A personal computer C. A laptop D. A mainframe E. A PDA

4. ________is a style sheet language used for describing the presentation of a document written in a markup language
    A. Creative Style Shots B. Creative Style Sheets C. Cascading Style Sheets D. Cascading Style Shots E. None of these

5. What is an E-mail attachment?
    A. A receipt sent by the recipient B. A separate document from another program sent along with an E-mail message C. A malicious parasite that feeds off of your messages and destroys the contents D. A list of CC: or BCC: recipients E. None of the above

Answers and Explanations
1. Answer - Option D
Explanation -
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
2. Answer - Option B
Explanation -
An operating system is the most important software that runs on a computer. It manages the computer’s memory, processes, and all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer’s language. Without an operating system, a computer is useless.
3. Answer - Option E
Explanation -
A personal digital assistant (PDA), also known as a handheld PC is a mobile device that functions as a personal information manager.
4. Answer - Option C
Explanation -
Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation of a document written in a mark-up language.
Note: Most often used to set the visual style of web pages and user interfaces written in HTML and XHTML, the language can be applied to any XML document, including plain XML, SVG and XUL, and is applicable to rendering in speech, or on other media.
5. Answer - Option B
Explanation -
An E-mail attachment is a computer file sent along with an E-mail message. It can be a picture, a word document, a movie, a sound file, an excel document, or any other file that requires another program to open it.
1. Computer memory that temporarily stores information is called the________
    A. RAM B. CPU C. ROM D. IBM E. None of these

2. The purpose of the primary key in a database is to_____.
    A. unlock the database B. a relationship between two tables C. uniquely identify a record D. establish constraints on database operations. E. None of these

3. Toolbars contain small outlined areas called ________ that provide shortcuts for quick access to commonly used commands.
    A. buttons B. dials C. bullets D. pointers E. None of these

4. The shortcut Key Ctrl + R is used in Excel to _____.
    A. Right align the content of cell B. Remove the cell contents of selected cells C. Fill the selection with active cells to the right D. Select multiple rows E. None of these

5. A cookie is ______.
    A. stores information about the user's web activity B. stores software developed by the user C. stores the password of the user D. stores the command used by the user E. None of these

Answers and Explanations
1. Answer - Option A
Explanation -
Random-access memory takes the form of integrated circuits. RAM is normally associated with volatile types of memory ,where stored information is lost if power is removed.
2. Answer - Option B
Explanation -
The main purpose of a primary key is to implement a relationship between two tables in a relational database.
3. Answer - Option A
Explanation -
Toolbars contain small outlined areas called buttons that provide shortcuts for quick access to commonly used commands.
4. Answer - Option C
Explanation -
Ctrl+R is uses the Fill Right command to copy the contents and format of the leftmost cell of a selected range into the cells to the right.
5. Answer - Option A
Explanation -
Cookies are small files which are stored on a user's computer. They are designed to hold a modest amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer.

Related Information
Computer Aptitude Important Terms
UPSC NDA and NA Humidity Quiz 1
Speed and Time Quiz 12
UPSC NDA and NA Mains General English Quiz 3