Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 9

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 9

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 9 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. Storage that retains its data after the power is turned off is referred to as _____.
    A. volatile storage B. sequential storage C. direct storage D. non-volatile storage E. mobile storage

2. Which protocol provides e-mail facility among different hosts?
    A. FTP B. SMTP C. TELNET D. SNMP E. None of these

3. Which of the following are components of Central Processing Unit (CPU)?
    A. Arithmetic Logic Unit, Mouse B. Arithmetic Logic Unit, Control Unit C. Arithmetic Logic Unit, Integrated Circuits D. Control Unit, Monitor E. All of the above

4. Firewall in parlance to computers is a method of _____.
    A. Stopping unauthorized access B. Making network more secure against hacking C. Filtering the data that is going out of network and combing in network D. All of the above E. None of these

5. ____this is the act of copying or downloading a program from a network and making multiple copies of it
    A. Network piracy B. Plagiarism C. Software piracy D. Site-license piracy E. None of these

Answers and Explanations
1. Answer - Option D
Explanation -
Non-volatile memory is computer memory that can retrieve stored information even after having been power cycled (turned off and back on).
2. Answer - Option B
Explanation -
Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321—which is the protocol in widespread use today. SMTP by default uses TCP port 25.
3. Answer - Option B
Explanation -
A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.
Note:- The term has been used in the computer industry at least since the early 1960s. Traditionally, the term "CPU" refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.
4. Answer - Option D
Explanation -
Firewall system is designed to prevent unauthorized access to or from a private network. All message entering or leaving the internet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
5. Answer - Option C
Explanation -
Software piracy is the illegal/unauthorized copying or distribution of copy righted software. This can be done by copying, downloading, sharing,selling ,or installing multiple copies onto personal or work computers.
1. A fixed number of adjacent bits that represent a particular character or symbol are referred as______.
    A. Byte B. Octal C. Bubble D. All of the above E. None of these

2. A collection of conceptual tools for describing data, relationships, semantics and constraints is referred to as ____.
    A. ER model B. Data base C. Data Model D. DBMS E. None of these

3. _______is the process of dividing the disk into tracks and sectors.
    A. Tracking B. Formatting C. Crashing D. Allotting E. None of these

4. What type of computers are client computers (most of the time) in a client-server system?
    A. Mainframe B. Mini-computer C. Microcomputer D. PDA E. None of these

5. A connection from one HTML document to another HTML document is called____.
    A. Hyper Link B. Connecting Link C. Icon D. All of these E. None of these

Answers and Explanations
1. Answer - Option A
Explanation -
The byte is a unit of digital information that most commonly consists of eight bits. The byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable unit of memory in many computer architectures.
2. Answer - Option C
Explanation -
A data model organizes data elements and standardizes how the data elements relate to one another. Since data elements document real life people, places and things and the events between them, the data model represents reality, for example a house has many windows or a cat has two eyes. Computers are used for the accounting of these real life things and events and therefore the data model is a necessary standard to ensure exact communication between human beings.
3. Answer - Option B
Explanation -
Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk or USB flash drive for initial use.
4. Answer - Option A
Explanation -
Mainframe computers are client computers in a client-server system. Note:- Mainframe computers are computers used primarily by large organizations for critical applications, bulk data processing such as census, industry and consumer statistics, enterprise resource planning and transaction processing, etc.
5. Answer - Option A
Explanation -
In computing, a hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering.
Note:- A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks.
1. ______are symbols used to replace or represent one or more characters.
    A. Playing cards B. Wildcard C. Private keys D. Public keys E. None of these

2. Which device uses a handheld operating system?
    A. A Tablet B. A Personal Computer C. a Laptop D. A mainframe E. None of these

3. ______ is the most important/powerful computer in a typical network.
    A. Desktop B. Network client C. Network server D. Network station E. Network switch

4. What is backup?
    A. Adding more components to your network. B. Protecting data by copying it from the original source to a different destination. C. Filtering old data from the new data. D. Accessing data on tape E. Using earlier data

5. Which key is used to delete one character to the left of the current position of the cursor?
    A. Backspace B. Ctrl C. Insert D. Esc E. None of these

Answers and Explanations
1. Answer - Option B
Explanation -
A wildcard is a symbol used to replace or represent one or more characters.
2. Answer - Option A
Explanation -
A tablet (along with smartphone)is one of the most commonly used handheld devices. It uses handheld OS like Android, iOS, Symbian etc
3. Answer - Option C
Explanation -
Network servers have many functions and can form an important part of your computer network.
4. Answer - Option B
Explanation -
Backup is the copying and archiving of computer data so it may be used to restore the original after a data loss event.
Note:- Protecting data by copying it from the original source to a different destination.
5. Answer - Option A
Explanation -
The Backspace key is used to delete one character to the left of the current position of the cursor.
Note: Backspace is the keyboard key that originally pushed one position backwards, and in modern computer systems moves the display cursor one position backwards.

Related Information
Computer Aptitude Important Terms
SSC CPO Synonyms Quiz 1
IBPS Clerk Reasoning Ability Quiz 1
SSC CPO Averages Quiz 1