Computer Awareness - SPLessons

IBPS PO Mains Computer Aptitude Quiz 8

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

IBPS PO Mains Computer Aptitude Quiz 8

shape Introduction

What is Computer Awareness? Computer Awareness, also known as Computer Aptitude is one of the prominent sections in various recruitment related competitive exams in India. IBPS PO Mains Computer Aptitude Quiz 8 lists some of the important questions for the preparation of Computer Awareness module. The most significant topics to be learnt for Computer Awareness module are as follows:
  1. History of Computers
  2. Computer Fundamentals
  3. Parts of a Computer System
  4. Data Processing Cycle of a Computer
  5. Computer Languages
  6. Input Devices & Output Devices
  7. Operating Systems
  8. Database Management Systems
  9. Microsoft Office
  10. Keyboard Shortcuts
  11. File Extensions
  12. Networking and Internet
  13. Computer Viruses
  14. Important Abbreviations

shape Quiz

1. A device that copies or reproduces text and images is also called a(n) _______.
    A. optical scanner B. bar code reader C. character device D. digital camera E. printer

2. Which protocol provides e-mail facility among different hosts?
    A. FTP B. SMTP C. TELNET D. SNMP E. None of these

3. In case of MS-access, the rows of table corresponds to _____.
    A. Field B. Records C. Reports D. Files E. None of these

4. In recent years _____has been developed to give IP connectivity to GSM users
    A. LANs B. ATM C. GPRS D. All of these E. None of these

5. If we want to share a broadband Internet connection. We must install a (n) ____________ on a network
    A. router B. modem C. node D. cable E. None of these

Answers and Explanations
1. Answer - Option A
Explanation -
An optical scanner is an input device using light beams to scan and digitally convert images, codes, text or objects as two-dimensional (2D) digital files and sends them to computers and fax machines. Flatbed scanning devices are the most popular optical scanners. Optical scanners are used for many purposes, including reading customized response forms, creating automated data fields and recording fingerprints.
2. Answer - Option B
Explanation -
SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP that let the user save messages in a server mailbox and download them periodically from the server. SMTP usually is implemented to operate over Internet port 25.
Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail.
3. Answer - Option B
Explanation -
In MS-access the row of table corresponds to Record. A record is a collection of elements, typically in fixed number and sequence and typically indexed by serial numbers or identity numbers.
4. Answer - Option C
Explanation -
The development of GPRS networks provides several advantages to GSM network operators. It allows to integrate the IP protocol t, to the GSM network and consequently the TCP/IP protocol suite.
5. Answer - Option A
Explanation -
A router is a device that forwards data packets along networks. A router is connected to at least two networks. Routers are located at gateways, the places where two or more networks connect.
1. Inventor of C++ is ______.
    A. A Martin Cooper B. Vint Cerf C. Charles Babbage D. Bjarne Stroustrup E. None of these

2. A button that makes character either upper or lower case and numbers to symbols.
    A. Monitor B. Shift key C. Icon D. Mouse E. None of these

3. In most WANs, the network contains numerous cables of telephone lines, each one connecting a pair of ____.
    A. Packet B. Star topology C. Router D. Antennas E. None of these

4. ____________ is when the computer is turned on and the operating system is loading
    A. Booting B. Spoofing C. Formatting D. Initiating E. Loading

5. This power protection device includes a battery that provides a few minutes of power
    A. surge suppressor B. line conditioner C. generator D. UPS E. None of these

Answers and Explanations
1. Answer - Option D
Explanation -
Danish computer scientist Bjarne Stroustrup invented and developed widely used C++ programming language.
2. Answer - Option B
Explanation -
The shift key is a modifier key on a keyboard, used to type capital letters and another alternate "upper" characters. When the caps lock key is engaged, the shift key can be used to type lowercase letters on many operating systems.
3. Answer - Option C
Explanation -
WAN spans a large geographical area. Often a country or continent. The host are connected by a communication subnet. This subnet consists of 2 distinct components : Transmission lines and switching elements. So.it WAN’s the network numerous cables of telephone lines. Each one connecting a pair of routers if two routers that do not share a cable nevertheless with to communicate they must do this indirectly.
4. Answer - Option A
Explanation -
In computing, booting (or booting up) is the initialization of a computerized system
5. Answer - Option D
Explanation -
An uninterruptible power supply (UPS) is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails.
1. One security method is encryption. But encryption does nothing to keep digital pests and hackers out. To accomplish this goal, we need
    A. Router B. Bridges C. Hubs D. Anti-Virus E. Firewalls

2. Any data or instruction entered into the memory of a computer are considered ______.
    A. storage B. output C. input D. information E. None of these

3. The amount of time required by a storage device to retrieve data and programs is its____.
    A. retrieval speed B. capacity C. memory D. storage E. access speed

4. The ________ component is used by the data analyst to create queries that access the database
    A. data store B. query and reporting C. ETL tools D. data visualisation E. None of these

5. Access control based on a person’s fingerprints is an example of ______.
    A. A bio-metric identification B. characteristic identification C. characteristic security D. fingerprint security E. logistics

Answers and Explanations
1. Answer - Option E
Explanation -
Main objective of the firewall is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on the predetermined rule set.
2. Answer - Option C
Explanation -
In computer science, the general meaning of input is to provide or give something to the computer. Input devices are used for sending instructions to the computer.
3. Answer - Option E
Explanation -
Access Speed is the average amount of time it takes for a floppy drive, hard drive, CD drive, or other drive to find any particular piece of data on a disk and send it to your PC.
Note: Access speed is typically listed in milliseconds (ms).
4. Answer - Option B
Explanation -
Query and reporting components implement the functionality to select, filter, view and present business data in a variety of readable formats.
5. Answer - Option A
Explanation -
Access control based on a person’s fingerprints is an example of bio-metric identification. Bio-metrics refers to metrics related to human characteristics. Bio-metrics authentication is used in computer science as a form of identification and access. It is also used to identify individuals in groups that are under surveillance.

Related Information
Marketing Aptitude Quiz 51
IBPS PO Insurance Awareness Quiz 1
UPSC NDA and NA Mains General Awareness Quiz 6