Bank IBPS CWE (Po/Clerk) Online Quiz Of Computer Awareness

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Stportal
S
Stportal
Community Contributor
Quizzes Created: 3 | Total Attempts: 3,050
| Attempts: 2,179 | Questions: 20
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. A collection of program that controls how your computer system runs and processes information is called

Explanation

An operating system is a collection of programs that manages and controls the hardware and software resources of a computer system. It provides an interface for users to interact with the computer and ensures that all the processes and tasks are executed efficiently. It manages memory, file systems, input/output devices, and other system resources. Therefore, the correct answer is Operating System.

Submit
Please wait...
About This Quiz
Bank IBPS CWE (Po/Clerk) Online Quiz Of Computer Awareness - Quiz

In our Quiz section, Today we are providing our readers with Computer Awareness Quiz for latest Bank IBPS CWE PO/Clerk Exams.
Take the quiz and see your score... see moreat the end of the quiz.
Hope this Quiz will help you in your preparation for Computer Awareness section of various Bank PO Exams.
Best of Luck! From ST Portal India. see less

2. The linking of computers with a communication system is called

Explanation

Networking refers to the process of connecting computers and other devices together to share information and resources. It involves the use of communication systems to establish connections and enable data transfer between devices. The term "networking" accurately describes the action of linking computers together, making it the correct answer in this context.

Submit
3. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as_________

Explanation

Unwanted repetitious messages, particularly unsolicited bulk e-mails, are commonly referred to as spam. Spam is typically sent in large quantities to a wide range of recipients without their consent. It is often used for advertising purposes or to spread malicious content.

Submit
4. Which of the following is a part of the Central Processing Unit?

Explanation

The Arithmetic & Logic unit is a crucial component of the Central Processing Unit (CPU). It is responsible for performing all arithmetic operations (such as addition, subtraction, multiplication, and division) and logical operations (such as comparisons and Boolean operations) required by the computer's programs. The Printer, Mouse, Keyboard, and Mother-Board are not part of the CPU, but rather peripheral devices or other components of the computer system.

Submit
5. How many options does a BINARY choice offer?

Explanation

A binary choice offers two options. In binary, there are only two digits, 0 and 1, which represent the two possible options. Therefore, a binary choice can only have two options.

Submit
6. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.

Explanation

Artificial intelligence (AI) is the correct answer because it is the field of science that aims to create machines capable of exhibiting human-like intelligence. AI involves developing computer systems that can perform tasks that typically require human intelligence, such as problem-solving, learning, and decision-making. Through the use of algorithms and machine learning, AI seeks to replicate human intelligence and behavior in machines, enabling them to understand, reason, and interact with the world in a similar way to humans.

Submit
7. Which of the following refers to a small, single-site network?

Explanation

A LAN (Local Area Network) refers to a small, single-site network. It is a network that connects computers and devices within a limited area such as a home, office, or building. LANs are commonly used for sharing resources, such as files and printers, and for facilitating communication between devices within the network. Unlike WANs (Wide Area Networks) that connect multiple LANs over a larger geographical area, LANs are confined to a specific location. DSL, CPU, and RAM are not specific to small, single-site networks and do not refer to the concept described.

Submit
8. Memory which forgets every thing when you switch off the power is known as__________

Explanation

The correct answer is Volatile. Volatile memory refers to a type of computer memory that loses its stored data when the power supply is turned off or interrupted. It is temporary and is used for storing data that needs to be accessed quickly by the computer's processor. Examples of volatile memory include RAM (Random Access Memory) and cache memory.

Submit
9. The name for the way that computers manipulate data into information is called:

Explanation

Processing is the correct answer because computers manipulate raw data and convert it into meaningful information through various operations such as calculations, sorting, filtering, and transforming. This involves executing instructions and algorithms to perform tasks and produce output. Programming refers to the process of creating instructions for the computer, while storing and organizing are related to data management. A compiler is a program that translates source code into machine code. Therefore, processing best describes the overall activity of transforming data into information.

Submit
10. ____________ is data that has been organized or presented in a meaningful fashion.

Explanation

Information is data that has been organized or presented in a meaningful fashion. It is the result of processing raw data using software or other tools to make it understandable and useful. Storage refers to the physical or digital medium where data is stored, but it does not necessarily imply organization or presentation. Therefore, the correct answer is information.

Submit
11. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

Explanation

In the binary language, each letter of the alphabet, number, and special character is represented using a unique combination of bits. A bit is the smallest unit of data in a computer, and it can have a value of either 0 or 1. Therefore, the correct answer is "eight bit" because it accurately describes the unique combination used to represent each character in binary.

Submit
12. DOS stands for____________

Explanation

DOS stands for Disk Operation System. This is a computer operating system that uses disk storage as its primary means of organizing and retrieving data. It was commonly used in the early days of personal computers, particularly with the introduction of IBM PC and compatible systems. DOS allowed users to interact with the computer through a command line interface, executing commands and managing files stored on disk drives.

Submit
13. DSL is an example of a(n) ____________ connection.

Explanation

DSL (Digital Subscriber Line) is a type of broadband connection. It uses existing telephone lines to transmit data at high speeds, making it a faster and more reliable option compared to dial-up or slow connections. Therefore, the correct answer is broadband.

Submit
14. The lowest form of Computer language is called_______

Explanation

Machine Language is considered the lowest form of computer language because it directly corresponds to the hardware and is understood by the computer's processor. It consists of binary code, represented by 0s and 1s, which the computer can execute directly. Unlike high-level languages like BASIC, FORTRAN, COBOL, and JAVA, which require a compiler or interpreter to convert the code into machine language, machine language instructions can be executed directly by the computer without any translation. Therefore, machine language is the most fundamental and basic form of programming language.

Submit
15. Computers gather data, which means that they allow users to ____________ data.

Explanation

Computers gather data by allowing users to input information. Inputting data refers to the process of entering or providing data to a computer system. This can be done through various means such as typing on a keyboard, using a mouse, or scanning documents. Therefore, the correct answer is "input".

Submit
16. A self replicating program, similar to a virus which was taken from a 1970s science fiction novel by John Bruner entitled the Shockwave Rider is _________

Explanation

The correct answer is "Worm". A self-replicating program that resembles a virus, originating from a science fiction novel called "Shockwave Rider" by John Bruner, is commonly referred to as a worm. Unlike viruses, worms do not require a host program to spread and can replicate themselves across networks or systems. They can cause harm by consuming system resources, disrupting network communication, or carrying out malicious activities.

Submit
17. A ____________ is approximately one billion bytes.

Explanation

A gigabyte is a unit of digital information that is approximately one billion bytes. It is commonly used to measure the storage capacity of computer systems and storage devices.

Submit
18. All of the following are examples of real security and privacy risks EXCEPT:

Explanation

Spam is not typically considered a direct security or privacy risk like the other options listed. While it can be annoying and time-consuming to deal with, it does not typically involve stealing personal information, compromising system security, or invading privacy. Spam is usually just unsolicited and unwanted messages sent in bulk.

Submit
19. A process known as ____________ is used by large retailers to study trends.

Explanation

Large retailers use a process called POS (Point of Sale) to study trends. POS refers to the system that records and tracks sales transactions at the point of purchase. It collects data on items sold, prices, quantities, and customer information. This data is then analyzed to identify patterns, trends, and insights that can help retailers make informed business decisions, such as inventory management, pricing strategies, and marketing campaigns. Data mining and data selection are related processes but not specifically mentioned in the given question. Data conversion is not relevant to studying trends in large retailers. Therefore, the correct answer is POS (Point of Sale).

Submit
20. A process known as ____________ is used by large retailers to study trends.

Explanation

Large retailers use a process called data mining to study trends. Data mining involves analyzing large sets of data to discover patterns, relationships, and insights that can be used to make informed business decisions. By examining customer purchasing behavior, sales data, and other relevant information, retailers can identify trends and patterns that can help them optimize their inventory, improve marketing strategies, and enhance overall business performance.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 09, 2013
    Quiz Created by
    Stportal
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A collection of program that controls how your computer system runs...
The linking of computers with a communication system is called
Unwanted repetitious messages, such as unsolicited bulk e-mail is...
Which of the following is a part of the Central Processing Unit?
How many options does a BINARY choice offer?
____________ is the science that attempts to produce machines that...
Which of the following refers to a small, single-site network?
Memory which forgets every thing when you switch off the power is...
The name for the way that computers manipulate data into information...
____________ is data that has been organized or presented in a...
In the binary language each letter of the alphabet, each number and...
DOS stands for____________
DSL is an example of a(n) ____________ connection.
The lowest form of Computer language is called_______
Computers gather data, which means that they allow users to...
A self replicating program, similar to a virus which was taken from a...
A ____________ is approximately one billion bytes.
All of the following are examples of real security and privacy risks...
A process known as ____________ is used by large retailers to study...
A process known as ____________ is used by large retailers to study...
Alert!

Advertisement