Computer Aptitude Questions for IBPS Clerk Mains - 20th January 2019

1.

How should you print a selected area of a worksheet, if you’ll want to print a different area next time?

   A.) On the file menu, point to print area, and then click set print area.
   B.) On the file menu, click print, and then click Print Selection under print settings
   C.) On the view menu, click custom views, then click add
   D.) All of the above

Answer: Option 'B'

User can select an area and then print the selected section by clicking on print selection in the print settings

2.

Which protocol is used to convert IP addresses to MAC addresses?

   A.) IP
   B.) RARP
   C.) In ARP
   D.) ARP

Answer: Option 'D'

The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses.

3.

_________ is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control to modify the software code on the device or install other software that the manufacturer wouldn’t normally allow you to.

   A.) Slash
   B.) Hacking
   C.) Booting
   D.) Rooting   

Answer: Option 'D'

Rooting gives the ability (or permission) to alter or replace system applications and settings, run specialized applications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. Jailbreaking is a term with similar meaning for iOS devices.

4.

A virus that migrates freely within a large population of unauthorized email user is called a __________.

   A.) worm
   B.) flame war
   C.) macro
   D.) plagiarism

Answer: Option 'C'

A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)

5.

Which of the following is used to open file menu options in current program?

   A.) Ctrl+F
   B.) Shift+F
   C.) Alt+F
   D.) Alt+Ctrl+F

Answer: Option 'C'

Alt+F

6.

Which of the following units performs the arithmetic tasks (such as addition, subtraction, multiplication and division) and logical operations?  

   A.) Input unit
   B.) Control unit
   C.) Arithmetic Logic Unit (ALU)
   D.) Storage unit

Answer: Option 'C'

Arithmetic Logic Unit (ALU) performs arithmetic and logical operations. On the other hand, control unit extracts instructions from the computer memory, decodes and executes instructions, and takes help of the ALU if required. Storage unit or memory unit is used to store the data, while the input is used to enter data into the computer.

7.

Decryption & Encryption of data are the responsibility of which layer.

   A.) Application
   B.) Presentation
   C.) Physical
   D.) Data Link

Answer: Option 'B'

Presentation layer is responsible for character-code translation, data conversion, data encryption and decryption, and data translation.

8.

What does MAN stands for?

   A.) Micro area network
   B.) Metropolitan area network
   C.) Macro area network
   D.) Mix area network

Answer: Option 'B'

MAN is abbreviation for Metropolitan Area Network.

9.

The abbreviation ISP stands for______

   A.) International spy project
   B.) Indian social planning
   C.) Internet solution provider
   D.) Internet service provider

Answer: Option 'D'

An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

10.

Which among the following is Microsoft's core set of application programming interfaces (APIs) available in the Microsoft Windows operating systems?

   A.) Kernel
   B.) WinAPI
   C.) Windows ME
   D.) DOS

Answer: Option 'B'

The Windows API, informally WinAPI, is Microsoft's core set of application programming interfaces (APIs) available in the Microsoft Windows operating systems. The name Windows API collectively refers to several different platform mplementations that are often referred to by their own names (for example, Win32 API). The Windows API (Win32) is focused mainly on the programming language C in that its exposed functions and data structures are described in that language in recent versions of its documentation. 

11.

_____ is the set of programs that enables your computer’s hardware devices and application software to work together. 

   A.) Word processing software
   B.) Utility software
   C.) Memory
   D.) Programming software

Answer: Option 'B'

Utility software is system software designed to help analyze, configure, optimize or maintain a computer.

12.

Which of the following characteristics is used to compute dynamically the results from Excel data?

   A.) Go to
   B.) Table
   C.) Chart
   D.) Formula and Function 

Answer: Option 'D'

Formula and Function 

13.

The software that is used to create text based documents is referred as :

   A.) DBMS
   B.) Spreadsheets
   C.) Presentation software
   D.) Word processor 

Answer: Option 'D'

Word processors are used to create text based documents.

14.

What does the LOOKUP function do?

   A.) Looks up text that contain ‘UP’
   B.) Used to look in a single row or column and find a value from the same position in a second row or column
   C.) Finds irrelevant records
   D.) All of above

Answer: Option 'B'

​Used to look in a single row or column and find a value from the same position in a second row or column

15.

A program embedded in a semiconductor chip during manufacture is called ____________ . 

   A.) Humanware
   B.) Firmware
   C.) Hardware
   D.) Extraware 

Answer: Option 'B'

Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.

16.

Which of the following is a correct set of hexadecimal digits?

   A.) 102n
   B.) a19fk
   C.) ZOLO12
   D.) FACE

Answer: Option 'C'

hexadecimal digits are written using symbols from 0-9 or A-F

17.

For each attribute of a relation, there is a set of permitted values, called the __________ of that attribute.

   A.) Domain
   B.) Relation
   C.) Set
   D.) Schema

Answer: Option 'A'

Set of permitted values is called the domain of that attribute.
 (Relation is a table. Attributes describe the instances in the row of a database.)

18.

The key F12 opens a ______.

   A.) SaveAs dialog box
   B.) Open dialog box
   C.) Save dialog box
   D.) Close dialog box

Answer: Option 'A'

SaveAs dialog box

19.

e-Governance is generally understood as the use of Information and Communication Technology at all the level of the Government to provide services to the citizens. Which among the following are the types of interactions in e-Governance?

   A.) G2B
   B.) G2G
   C.) G2E
   D.) All of the above 

Answer: Option 'D'

e-Governance facilitates interaction between different stake holders in governance. These interactions may be described as follows:

20.

e-Governance is generally understood as the use of Information and Communication Technology at all the level of the Government to provide services to the citizens. Which among the following are the types of interactions in e-Governance?

   A.) G2B
   B.) G2C
   C.) G2G
   D.) All of the above 

Answer: Option 'D'

e-Governance facilitates interaction between different stake holders in governance. These interactions may be described as follows:
G2G (Government to Government)
G2C (Government to Citizens)
G2B (Government to Business)
G2E (Government to Employees)


Computer Questions for IBPS Clerk Mains Download Pdf

Recent Posts