Bank IBPS CWE (Po/Clerk) Online Quiz Of Computer Awareness

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Stportal
S
Stportal
Community Contributor
Quizzes Created: 3 | Total Attempts: 3,045
Questions: 20 | Attempts: 2,179

SettingsSettingsSettings
Bank IBPS CWE (Po/Clerk) Online Quiz Of Computer Awareness - Quiz

In our Quiz section, Today we are providing our readers with Computer Awareness Quiz for latest Bank IBPS CWE PO/Clerk Exams.
Take the quiz and see your score at the end of the quiz.
Hope this Quiz will help you in your preparation for Computer Awareness section of various Bank PO Exams.
Best of Luck! From ST Portal India.


Questions and Answers
  • 1. 

    A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________

    • A.

      Vice

    • B.

      Bug

    • C.

      Lice

    • D.

      Worm

    Correct Answer
    D. Worm
    Explanation
    The correct answer is "Worm". A self-replicating program that resembles a virus, originating from a science fiction novel called "Shockwave Rider" by John Bruner, is commonly referred to as a worm. Unlike viruses, worms do not require a host program to spread and can replicate themselves across networks or systems. They can cause harm by consuming system resources, disrupting network communication, or carrying out malicious activities.

    Rate this question:

  • 2. 

    In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

    • A.

      Eight bytes

    • B.

      Eight kilobytes.

    • C.

      Eight characters.

    • D.

      Eight bit.

    Correct Answer
    D. Eight bit.
    Explanation
    In the binary language, each letter of the alphabet, number, and special character is represented using a unique combination of bits. A bit is the smallest unit of data in a computer, and it can have a value of either 0 or 1. Therefore, the correct answer is "eight bit" because it accurately describes the unique combination used to represent each character in binary.

    Rate this question:

  • 3. 

    The linking of computers with a communication system is called

    • A.

      Networking

    • B.

      Pairing

    • C.

      Interlocking

    • D.

      Assembling

    • E.

      Sharing

    Correct Answer
    A. Networking
    Explanation
    Networking refers to the process of connecting computers and other devices together to share information and resources. It involves the use of communication systems to establish connections and enable data transfer between devices. The term "networking" accurately describes the action of linking computers together, making it the correct answer in this context.

    Rate this question:

  • 4. 

    A collection of program that controls how your computer system runs and processes information is called

    • A.

      Operating System

    • B.

      Computer

    • C.

      Office

    • D.

      Interpreter

    • E.

      Compiler

    Correct Answer
    A. Operating System
    Explanation
    An operating system is a collection of programs that manages and controls the hardware and software resources of a computer system. It provides an interface for users to interact with the computer and ensures that all the processes and tasks are executed efficiently. It manages memory, file systems, input/output devices, and other system resources. Therefore, the correct answer is Operating System.

    Rate this question:

  • 5. 

    The name for the way that computers manipulate data into information is called:

    • A.

      Programming.

    • B.

      Processing.

    • C.

      Storing

    • D.

      Organizing.

    • E.

      Compiler

    Correct Answer
    B. Processing.
    Explanation
    Processing is the correct answer because computers manipulate raw data and convert it into meaningful information through various operations such as calculations, sorting, filtering, and transforming. This involves executing instructions and algorithms to perform tasks and produce output. Programming refers to the process of creating instructions for the computer, while storing and organizing are related to data management. A compiler is a program that translates source code into machine code. Therefore, processing best describes the overall activity of transforming data into information.

    Rate this question:

  • 6. 

    A process known as ____________ is used by large retailers to study trends.

    • A.

      Data mining

    • B.

      Data selection

    • C.

      POS(Point of Sale)

    • D.

      Data conversion

    • E.

      None of these

    Correct Answer
    C. POS(Point of Sale)
    Explanation
    Large retailers use a process called POS (Point of Sale) to study trends. POS refers to the system that records and tracks sales transactions at the point of purchase. It collects data on items sold, prices, quantities, and customer information. This data is then analyzed to identify patterns, trends, and insights that can help retailers make informed business decisions, such as inventory management, pricing strategies, and marketing campaigns. Data mining and data selection are related processes but not specifically mentioned in the given question. Data conversion is not relevant to studying trends in large retailers. Therefore, the correct answer is POS (Point of Sale).

    Rate this question:

  • 7. 

    ____________ is data that has been organized or presented in a meaningful fashion.

    • A.

      Processing

    • B.

      Information

    • C.

      Software

    • D.

      Storage

    • E.

      None of these

    Correct Answer
    B. Information
    Explanation
    Information is data that has been organized or presented in a meaningful fashion. It is the result of processing raw data using software or other tools to make it understandable and useful. Storage refers to the physical or digital medium where data is stored, but it does not necessarily imply organization or presentation. Therefore, the correct answer is information.

    Rate this question:

  • 8. 

    DOS stands for____________

    • A.

      Direct Operation System

    • B.

      Disk Operation Software

    • C.

      Disk Operation System

    • D.

      Direct Operation Software

    • E.

      None of these

    Correct Answer
    C. Disk Operation System
    Explanation
    DOS stands for Disk Operation System. This is a computer operating system that uses disk storage as its primary means of organizing and retrieving data. It was commonly used in the early days of personal computers, particularly with the introduction of IBM PC and compatible systems. DOS allowed users to interact with the computer through a command line interface, executing commands and managing files stored on disk drives.

    Rate this question:

  • 9. 

    DSL is an example of a(n) ____________ connection.

    • A.

      Network

    • B.

      Wireless

    • C.

      Slow

    • D.

      Broadband

    • E.

      None of these

    Correct Answer
    D. Broadband
    Explanation
    DSL (Digital Subscriber Line) is a type of broadband connection. It uses existing telephone lines to transmit data at high speeds, making it a faster and more reliable option compared to dial-up or slow connections. Therefore, the correct answer is broadband.

    Rate this question:

  • 10. 

    Memory which forgets every thing when you switch off the power is known as__________

    • A.

      Corrupted

    • B.

      Volatile

    • C.

      Non-Volatile

    • D.

      Non-Corrupted

    • E.

      None of these

    Correct Answer
    B. Volatile
    Explanation
    The correct answer is Volatile. Volatile memory refers to a type of computer memory that loses its stored data when the power supply is turned off or interrupted. It is temporary and is used for storing data that needs to be accessed quickly by the computer's processor. Examples of volatile memory include RAM (Random Access Memory) and cache memory.

    Rate this question:

  • 11. 

    How many options does a BINARY choice offer?

    • A.

      Two

    • B.

      One

    • C.

      Three

    • D.

      It depends on the amount of memory on the computer

    • E.

      None

    Correct Answer
    A. Two
    Explanation
    A binary choice offers two options. In binary, there are only two digits, 0 and 1, which represent the two possible options. Therefore, a binary choice can only have two options.

    Rate this question:

  • 12. 

    A ____________ is approximately one billion bytes.

    • A.

      Kilobyte

    • B.

      Bit

    • C.

      Gigabyte

    • D.

      Megabyte

    • E.

      Terabyte

    Correct Answer
    C. Gigabyte
    Explanation
    A gigabyte is a unit of digital information that is approximately one billion bytes. It is commonly used to measure the storage capacity of computer systems and storage devices.

    Rate this question:

  • 13. 

    ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.

    • A.

      Artificial intelligence (AI)

    • B.

      Simulation

    • C.

      Nanotechnology

    • D.

      Nanoscience

    • E.

      None of these

    Correct Answer
    A. Artificial intelligence (AI)
    Explanation
    Artificial intelligence (AI) is the correct answer because it is the field of science that aims to create machines capable of exhibiting human-like intelligence. AI involves developing computer systems that can perform tasks that typically require human intelligence, such as problem-solving, learning, and decision-making. Through the use of algorithms and machine learning, AI seeks to replicate human intelligence and behavior in machines, enabling them to understand, reason, and interact with the world in a similar way to humans.

    Rate this question:

  • 14. 

    Unwanted repetitious messages, such as unsolicited bulk e-mail is known as_________

    • A.

      Courier

    • B.

      Calibri

    • C.

      Trash

    • D.

      Spam

    • E.

      Bug

    Correct Answer
    D. Spam
    Explanation
    Unwanted repetitious messages, particularly unsolicited bulk e-mails, are commonly referred to as spam. Spam is typically sent in large quantities to a wide range of recipients without their consent. It is often used for advertising purposes or to spread malicious content.

    Rate this question:

  • 15. 

    A process known as ____________ is used by large retailers to study trends.

    • A.

      Data mining

    • B.

      Data selection

    • C.

      Data conversion

    • D.

      POS Point of Sale

    Correct Answer
    A. Data mining
    Explanation
    Large retailers use a process called data mining to study trends. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used to make informed business decisions. By examining customer purchasing behavior, sales data, and other relevant information, retailers can identify trends and patterns that can help them optimize their inventory, improve marketing strategies, and enhance overall business performance.

    Rate this question:

  • 16. 

    Computers gather data, which means that they allow users to ____________ data.

    • A.

      Present

    • B.

      Input

    • C.

      Output

    • D.

      Store

    Correct Answer
    B. Input
    Explanation
    Computers gather data by allowing users to input information. Inputting data refers to the process of entering or providing data to a computer system. This can be done through various means such as typing on a keyboard, using a mouse, or scanning documents. Therefore, the correct answer is "input".

    Rate this question:

  • 17. 

    All of the following are examples of real security and privacy risks EXCEPT:

    • A.

      Identity theft.

    • B.

      Viruses

    • C.

      Hackers

    • D.

      Spam

    • E.

      Worm

    Correct Answer
    D. Spam
    Explanation
    Spam is not typically considered a direct security or privacy risk like the other options listed. While it can be annoying and time-consuming to deal with, it does not typically involve stealing personal information, compromising system security, or invading privacy. Spam is usually just unsolicited and unwanted messages sent in bulk.

    Rate this question:

  • 18. 

    Which of the following is a part of the Central Processing Unit?

    • A.

      Printer

    • B.

      Mouse

    • C.

      Arithmetic & Logic unit

    • D.

      Key board

    • E.

      Mother-Board

    Correct Answer
    C. Arithmetic & Logic unit
    Explanation
    The Arithmetic & Logic unit is a crucial component of the Central Processing Unit (CPU). It is responsible for performing all arithmetic operations (such as addition, subtraction, multiplication, and division) and logical operations (such as comparisons and Boolean operations) required by the computer's programs. The Printer, Mouse, Keyboard, and Mother-Board are not part of the CPU, but rather peripheral devices or other components of the computer system.

    Rate this question:

  • 19. 

    Which of the following refers to a small, single-site network?

    • A.

      DSL

    • B.

      LAN

    • C.

      WAN

    • D.

      CPU

    • E.

      RAM

    Correct Answer
    B. LAN
    Explanation
    A LAN (Local Area Network) refers to a small, single-site network. It is a network that connects computers and devices within a limited area such as a home, office, or building. LANs are commonly used for sharing resources, such as files and printers, and for facilitating communication between devices within the network. Unlike WANs (Wide Area Networks) that connect multiple LANs over a larger geographical area, LANs are confined to a specific location. DSL, CPU, and RAM are not specific to small, single-site networks and do not refer to the concept described.

    Rate this question:

  • 20. 

    The lowest form of Computer language is called_______

    • A.

      BASIC

    • B.

      FORTRAN

    • C.

      COBOL

    • D.

      Machine Language

    • E.

      JAVA

    Correct Answer
    D. Machine Language
    Explanation
    Machine Language is considered the lowest form of computer language because it directly corresponds to the hardware and is understood by the computer's processor. It consists of binary code, represented by 0s and 1s, which the computer can execute directly. Unlike high-level languages like BASIC, FORTRAN, COBOL, and JAVA, which require a compiler or interpreter to convert the code into machine language, machine language instructions can be executed directly by the computer without any translation. Therefore, machine language is the most fundamental and basic form of programming language.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 09, 2013
    Quiz Created by
    Stportal
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.