Computer Aptitude Questions for IBPS Clerk Mains - 20th January 2019

1.

Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?

   A.) Toggle
   B.) Cold booting
   C.) Warm booting
   D.) Logging off

Answer: Option 'B'

​Cold booting

2.

From which version Microsoft introduced Backstage View for Access Interface?

   A.) Access 2003
   B.) Access 2007
   C.) Access 2010
   D.) Access 2000

Answer: Option 'B'

In Microsoft Office applications (Word, Excel, PowerPoint, Outlook, Access), versions 2007 and later there is an option for the backstage view that allows you to manipulate aspects of a file.

3.

Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?

   A.) ROM
   B.) EPROM
   C.) RAM
   D.) Extended memory

Answer: Option 'C'

Most operating Systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.

4.

Which of the following is used to open file menu options in current program?

   A.) Ctrl+F
   B.) Shift+F
   C.) Alt+F
   D.) Alt+Ctrl+F

Answer: Option 'C'

​Alt+F

5.

The software that is used to create text based documents is referred as :

   A.) DBMS
   B.) Spreadsheets
   C.) Presentation software
   D.) Word processor 

Answer: Option 'D'

Word processors are used to create text based documents.

6.

Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?

   A.) hacker
   B.) analyst
   C.) instant messenger
   D.) programmer

Answer: Option 'A'

Hacker is someone who seeks and exploits weaknesses in a computer system.

7.

What is the function of the AutoCorrect feature across all MS Office applications?

   A.) Replacing misspelled words with the correct ones while typing
   B.) Replacing grammatically incorrect words with the correct ones
   C.) Replacing repetitive words with the word ‘same’
   D.) Replacing selected words with the word ‘auto’

Answer: Option 'A'

The AutoCorrect feature is used to correct typo errors and miss-spelled words automatically according to the words given in the list for the AutoCorrect feature.

8.

What is the default cell content alignment in Excel?

   A.) left aligned
   B.) centrally aligned
   C.) text left aligned and numbers right aligned
   D.) text right aligned and numbers left aligned

Answer: Option 'C'

Text left aligned and numbers right aligned is default alignment in Excel. 

9.

__________ is usually recorded and played, displayed, or accessed by information content processing devices, which as computerized and electronic devices, but can also be part of live performance. 

   A.) Virus
   B.) BIOS software
   C.) Multimedia
   D.) C++

Answer: Option 'C'

Multimedia

10.

Of the 5 words listed below, which is the odd one out?  

   A.) Applications
   B.) Software
   C.) Programs
   D.) Peripherals

Answer: Option 'D'

Except for peripherals, all other options are examples of intangible instructions given to a computer to perform a specific type of task in on orderly manner.

11.

Which of the following units is used to measure the speed of the processor?  

   A.) Kilobytes (KB)
   B.) Gigabytes (GB)
   C.) Gigahertz (GHz)
   D.) Kilobits (Kb)

Answer: Option 'C'

A processor speed is measured in Gigahertz (GHz). 

12.

The two ways to arrange multiple windows on the desktop are:

   A.) cascade and tile
   B.) drag and drop
   C.) point and click
   D.) minimize and maximize

Answer: Option 'A'

cascade and tile are two ways to arrange multiple windows on the desktop. 

13.

Computer language COBOL is appropriate for _____

   A.) Graphic purpose
   B.) Scientific purpose
   C.) Commercial purpose 
   D.) All 

Answer: Option 'C'

COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.

14.

The SubSeven is an example of :

   A.) antivirus
   B.) Trojan horse
   C.) Adware
   D.) Spyware

Answer: Option 'B'

SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

15.

A program embedded in a semiconductor chip during manufacture is called ____________ . 

   A.) Humanware
   B.) Firmware
   C.) Hardware
   D.) Extraware 

Answer: Option 'B'

Firmware is a collection of permanent instructions and codes stored in a read-only memory. The firmware is usually placed by the manufactures of computers to store vital information about how computer hardware devices will communicate with each other and how programs will run on hardware devices.

16.

A __________ is a property of the entire relation, rather than of the individual tuples in which each tuple is unique.

   A.) Rows
   B.) Key
   C.) Attribute
   D.) Fields

Answer: Option 'B'

Key is a property of the entire relation (relation is a table).

17.

_________ is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control to modify the software code on the device or install other software that the manufacturer wouldn’t normally allow you to.

   A.) Slash
   B.) Hacking
   C.) Booting
   D.) Rooting   

Answer: Option 'D'

Rooting gives the ability (or permission) to alter or replace system applications and settings, run specialized applications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. Jailbreaking is a term with similar meaning for iOS devices.

18.

What type of web technology creates an online community where people can make statements and others can read and respond to those statements?

   A.) I-Journal
   B.) Blog
   C.) Podcast
   D.) ASP

Answer: Option 'B'

​Blog

19.

Computer gathers data, which means that they allow users to __________ data.

   A.) Present
   B.) Input
   C.) Output
   D.) Delete

Answer: Option 'B'

Computer allows user to input data.

20.

In Computer programming API is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is an application programming interface for the programming language Java, which defines how a client may access a database?

   A.) J2EE
   B.) JDK
   C.) JAVA SE
   D.) JDBC

Answer: Option 'D'

Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.


Computer Questions for IBPS Clerk Mains Download Pdf

Recent Posts