Computer Awareness - SPLessons

IBPS RRB Computer Awareness Quiz Day 7

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS RRB Computer Awareness Quiz Day 7

shape Introduction

What is Computer Aptitude? Computer Aptitude Test is a scientifically validated test designed to measure the aptitude for working with computers. Basically, it measures the ability to solve problems quickly that is essential to truly succeed in every field using computers.
Computers are an integral part of everyday life. Computer aptitude is an important section in many competitive exams primarily related to recruitment. Candidates preparing for banking exams like IBPS PO, SBI PO, and the RBI, must be prepared with Computer Aptitude syllabus.
"A Computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming". Computers follow a generalized set of operations termed as programs. The programs enable computers to perform an extremely wide range of tasks. Computers are now ubiquitous and are being used in every field of work. Thus, basic knowledge of computers and the ability to operate a computer is now crucial for all job aspirants.
Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS RRB Computer Awareness Quiz Day 7 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. Typically the TCP port used by SMTP is
    A. 25 B. 35 C. 50 D. 15

Answer: Option A
2. In SMTP, the command to write receivers mail address is written with this command
    A. SEND TO B. RCPT TO C. MAIL TO D. EMAIL FOR

Answer: Option B
3. SMTP defines
    A. message transport B. message encryption C. message content D. all of the mentioned

Answer: Option A
4. A SMTP session may include
    A. zero SMTP transaction B. one SMTP transaction C. more than one SMTP transaction D. all of the mentioned

Answer: Option D
5. What is on-demand mail relay (ODMR)?
    A. protocol for SMTP security B. an SMTP extension C. protocol for web pages D. all of the mentioned

Answer: Option B
1. SMTP uses the TCP port
    A. 22 B. 23 C. 24 D. 25

Answer: Option D
2. Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.
    A. TCP B. UDP C. DCCP D. SCTP

Answer: Option A
3. What is DHCP snooping?
    A. techniques applied to ensure the security of an existing DHCP infrastructure B. encryption of the DHCP server requests C. algorithm for DHCP D. all of the mentioned

Answer: Option A
4. DHCP client and servers on the same subnet communicate via
    A. UDP broadcast B. UDP unicast C. TCP broadcast D. TCP unicast

Answer: Option A
5. The DHCP server can provide the _______ of the IP addresses.
    A. dynamic allocation B. automatic allocation C. static allocation D. all of the mentioned

Answer: Option D
1. DHCP uses UDP port ____ for sending data to the server.
    A. 66 B. 67 C. 68 D. 69

Answer: Option B
2. The DHCP server
    A. maintains a database of available IP addresses B. maintains the information about client configuration parameters C. grants a IP address when receives a request from a client D. all of the mentioned

Answer: Option D
3. DHCP (dynamic host configuration protocol) provides _____ to the client.
    A. IP address B. MAC address C. url D. All of the mentioned

Answer: Option A
4. Sniffers can be deployed in
    A. Wired environment B. WiFi C. Ethernet LAN D. All of the mentioned

Answer: Option D
5. The DoS attack in which the attacker establishes a large number of half-open or fully open TCP connections at the target host
    A. Vulnerability attack B. Bandwidth flooding C. Connection flooding D. All of the mentioned

Answer: Option C

Other Articles

shape Exams

Competitive Exams - College Entrance Exams
Category Notification
PG GATE 2020 ATMA 2019
Click Here For – All India Entrance Exam Notifications


shape Job-Alerts

Competitive Exams - Recent Job Notifications
Category
Banking SSC Railway
Defence Police Insurance
Click Here For – All India Latest Jobs

shape SP Quiz

Competitive Exams - Practice Sets
Category Quiz
Quant Aptitude Spotting Errors
Profit and Loss
Reasoning Ability Puzzles
Insurance Awareness Insurance Awareness

shape GK

General Knowledge for Competitive Examinations
Topic Name of the Article
GK - World Miss World Titleholders
Miss Earth Titleholders
GK - India Various Indian Price Indices
Pravasi Bharatiya Divas
GK - Abbreviations Finance Abbreviations
GK - Banking & Insurance Bank Accounts Types
Banking Mobile Apps
GK - Science & Technology Chemical Elements
Chemistry Terminology