Computer Aptitude Questions for IBPS Clerk Mains - 20th January 2019

1.

Computer language COBOL is appropriate for _____

   A.) Graphic purpose
   B.) Scientific purpose
   C.) Commercial purpose 
   D.) All 

Answer: Option 'C'

COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.

DigitalOcean Referral Badge

2.

Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?

   A.) hacker
   B.) instant messenger
   C.) analyst
   D.) spammer

Answer: Option 'A'

Hacker is someone who seeks and exploits weaknesses in a computer system.

DigitalOcean Referral Badge

3.

What is the term that refers to an ad hidden inside software that you downloaded from an internet site?

   A.) Phish
   B.) Cookie
   C.) Adware
   D.) Spam

Answer: Option 'C'

Adware is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.

DigitalOcean Referral Badge

4.

Decryption & Encryption of data are the responsibility of which layer.

   A.) Application
   B.) Presentation
   C.) Physical
   D.) Data Link

Answer: Option 'B'

Presentation layer is responsible for character-code translation, data conversion, data encryption and decryption, and data translation.

DigitalOcean Referral Badge

5.

Which of the following contains permanent data and gets updated during the processing of transactions?

   A.) Operating System File
   B.) Transaction file
   C.) Software File
   D.) Master file

Answer: Option 'A'

Operating System File is a type of file that contains permanent data and gets updated later after creation or even during the processing of transactions.

DigitalOcean Referral Badge

6.

A barcode is ________ code that represents data with bars of varying widths or heights.

   A.) optical
   B.) read/write
   C.) magnetic
   D.) laser

Answer: Option 'A'

optical

DigitalOcean Referral Badge

7.

Which of the following language defines commands GRANT and REVOKE?

   A.) DDL
   B.) DML
   C.) DCL
   D.) DQL

Answer: Option 'C'

DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema. DCL use two commands to control access- GRANT and REVOKE.

DigitalOcean Referral Badge

8.

Which IEEE Standards is used for Wi-Fi system?

   A.) 802.11
   B.) 802.10
   C.) 802.2
   D.) 802.1

Answer: Option 'A'

Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area network(LAN) technology designed to provide in-building broadband coverage.

DigitalOcean Referral Badge

9.

Which protocol is used to convert IP addresses to MAC addresses?

   A.) IP
   B.) RARP
   C.) In ARP
   D.) ARP

Answer: Option 'D'

The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses.

DigitalOcean Referral Badge

10.

Which of the following key is a minimal super key?

   A.) Primary key
   B.) Alternate key
   C.) Candidate key
   D.) Secondary key

Answer: Option 'C'

A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.

DigitalOcean Referral Badge

11.

The abbreviation ISP stands for___

   A.) International spy project
   B.) Indian social planning
   C.) Internet solution provider
   D.) Internet service provider

Answer: Option 'D'

Internet service provider

DigitalOcean Referral Badge

12.

A barcode is ________ code that represents data with bars of varying widths or heights.

   A.) optical
   B.) magnetic
   C.) laser
   D.) read/write

Answer: Option 'A'

A barcode is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.

DigitalOcean Referral Badge

13.

Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?

   A.) ROM
   B.) EPROM
   C.) RAM
   D.) Extended memory

Answer: Option 'C'

Most operating Systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.

DigitalOcean Referral Badge

14.

Which of the following is used to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk?

   A.) Virtual programming
   B.) Spooling
   C.) Caching
   D.) Multi programming

Answer: Option 'B'

Spooling is a technique to hold data temporarily in the computer memory and provide to devices when they need it. The temporary holding area of the memory is sometimes referred to as the buffer. One common example of spooling is printing, where files are stored in the buffer and sent to the printer when it is ready.

DigitalOcean Referral Badge

15.

Which of the following is used to open file menu options in current program?

   A.) Ctrl+F
   B.) Shift+F
   C.) Alt+F
   D.) Alt+Ctrl+F

Answer: Option 'C'

​Alt+F

DigitalOcean Referral Badge

16.

Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?

   A.) Shareware
   B.) Application software
   C.) Public domain software
   D.) Operating system software

Answer: Option 'D'

An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.

DigitalOcean Referral Badge

17.

Which of the following topologies has the highest reliability?

   A.) Star topology
   B.) Bus topology
   C.) Ring topology
   D.) Mesh topology

Answer: Option 'D'

In the mesh topology, each computer is connected to the other with a separate physical link in a network. It is most reliable topology as the network does not get down in case one of the nodes is failed.

DigitalOcean Referral Badge

18.

Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 

   A.) program thievery
   B.) data snatching
   C.) software piracy
   D.) program looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.

DigitalOcean Referral Badge

19.

EDBIC code can support how many different representation of characters?

   A.) 256
   B.) 149
   C.) 64
   D.) 1024

Answer: Option 'A'

EBCDIC stands for Extended Binary Coded Decimal Interchange Code. EBCDIC is a 8-Bit code with 256 different representations of characters. It is mainly used in mainframe computers.

DigitalOcean Referral Badge

20.

The main webpage of a website is also known as ­

   A.) Contents Page
   B.) Home Page
   C.) Introduction Page
   D.) First Page

Answer: Option 'B'

A home page is the main page or the introductory page of a website, typically serving as a table of contents for the site.

DigitalOcean Referral Badge

21.

What is a hyperlink?

   A.) It is a text or image that you can click on to jump to a new document/page.
   B.) It is an input type for multimedia files.
   C.) It is a collection or directory of web pages.
   D.) It is the home page of a site.

Answer: Option 'A'

A hyperlink, or simply a link, is a reference to data that the reader can directly follow either by clicking, tapping, or hovering. Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page.

DigitalOcean Referral Badge

22.

What is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host?

   A.) Identity Theft
   B.) Forging
   C.) IP Spoofing 
   D.) Pharming

Answer: Option 'C'

​IP Spoofing 

DigitalOcean Referral Badge

23.

Portrait and Landscape are:

   A.) Page Orientation
   B.) page layout
   C.) page size
   D.) page view

Answer: Option 'A'

Page orientation is the way in which a rectangular page is oriented for normal viewing.

DigitalOcean Referral Badge

24.

Internet access by transmitting digital data over the wires of a local telephone network is provided by: 

   A.) leased line
   B.) digital subscriber line
   C.) digital signal line
   D.) MODEM

Answer: Option 'B'

Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.

DigitalOcean Referral Badge

25.

What type of web technology creates an online community where people can make statements and others can read and respond to those statements?

   A.) I-Journal
   B.) Blog
   C.) Podcast
   D.) ASP

Answer: Option 'B'

​Blog

DigitalOcean Referral Badge

26.

Which among the following on a computer or terminal keyboard which can be programmed so as to cause an operating system command interpreter or application program to perform certain actions or specific tasks?

   A.) Function Keys
   B.) Caps Lock Key
   C.) Number Keys
   D.) Esc

Answer: Option 'A'

A function key is one of a sequence of special keys labeled "F1" to "F12" (on most keyboards) that can be assigned a specific use to perform certain task.

DigitalOcean Referral Badge

27.

How many pins are there in a VGA Connector?

   A.) 12
   B.) 10
   C.) 15
   D.) 13

Answer: Option 'C'

​15

DigitalOcean Referral Badge

28.

Which among the following comes at last in an MS Excel Window?

   A.) Menu Bar
   B.) Task Bar
   C.) Formula Bar
   D.) Status Bar

Answer: Option 'D'

Status Bar

DigitalOcean Referral Badge

29.

A server can be a computer and storage device dedicated to storing files and it is connected to a _______ to serve other workstations.

   A.) Network
   B.) Node
   C.) Router
   D.) Protocol

Answer: Option 'A'

A server is a computer designed to process requests and deliver data to another computer over the internet or a local network.

DigitalOcean Referral Badge

30.

What is the full form of EDI?

   A.) Electronic Data Input
   B.) Electric Data Interchange
   C.) Electronic Data Interchange
   D.) Easy Data Interchange

Answer: Option 'C'

Electronic Data Interchange is the full form of EDI

DigitalOcean Referral Badge

31.

What is a Firewall in Computer Network?

   A.) The physical boundary of Network
   B.) An operating System of Computer Network
   C.) A system designed to prevent unauthorized access
   D.) A web browsing Software

Answer: Option 'C'

A system designed to prevent unauthorized access

DigitalOcean Referral Badge

32.

In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?

   A.) Star
   B.) Ring
   C.) Mesh
   D.) Tree

Answer: Option 'B'

A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.

DigitalOcean Referral Badge

33.

Which among the following appears in a URL whenever you search anything on a Search Engine?

   A.) google
   B.) https://
   C.) bing
   D.) en

Answer: Option 'B'

Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.

DigitalOcean Referral Badge

34.

Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?

   A.) Toggle
   B.) Cold booting
   C.) Warm booting
   D.) Logging off

Answer: Option 'B'

​Cold booting

DigitalOcean Referral Badge

35.

A virus that migrates freely within a large population of unauthorized email user is called a __________.

   A.) worm
   B.) flame war
   C.) macro
   D.) plagiarism

Answer: Option 'C'

A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)

DigitalOcean Referral Badge

36.

Which protocol is used to convert IP addresses to MAC addresses?

   A.) IP
   B.) RARP
   C.) In ARP
   D.) ARP

Answer: Option 'D'

The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses.

DigitalOcean Referral Badge

37.

Which IEEE Standards is used for Wi-Fi system?

   A.) 802.11
   B.) 802.1
   C.) 802.2
   D.) 802.3

Answer: Option 'A'

Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area network(LAN) technology designed to provide in-building broadband coverage.

DigitalOcean Referral Badge

38.

Which of the following key is a minimal super key?

   A.) Primary key
   B.) Alternate key
   C.) Candidate key
   D.) Secondary key

Answer: Option 'C'

​Candidate key

DigitalOcean Referral Badge

39.

The abbreviation ISP stands for______

   A.) International spy project
   B.) Indian social planning
   C.) Internet solution provider
   D.) Internet service provider

Answer: Option 'D'

An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

DigitalOcean Referral Badge

40.

A barcode is ________ code that represents data with bars of varying widths or heights.

   A.) optical
   B.) magnetic
   C.) laser
   D.) read/write

Answer: Option 'A'

A barcode is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.

DigitalOcean Referral Badge

41.

Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?

   A.) ROM
   B.) RAM
   C.) Extended memory
   D.) The registers

Answer: Option 'B'

Most operating Systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.

DigitalOcean Referral Badge

42.

Which of the following contains permanent data and gets updated during the processing of transactions?

   A.) Operating System File
   B.) Transaction file
   C.) Software File
   D.) Master file

Answer: Option 'A'

Operating System File is a type of file that contains permanent data and gets updated later after creation or even during the processing of transactions.

DigitalOcean Referral Badge

43.

Which of the following is used to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk?  

   A.) Virtual programming
   B.) Multi programming
   C.) Caching
   D.) Spooling

Answer: Option 'D'

Spooling is a technique to hold data temporarily in the computer memory and provide to devices when they need it. The temporary holding area of the memory is sometimes referred to as the buffer. One common example of spooling is printing, where files are stored in the buffer and sent to the printer when it is ready.

DigitalOcean Referral Badge

44.

Decryption & Encryption of data are the responsibility of which layer.

   A.) Physical
   B.) Application
   C.) Presentation
   D.) Data Link

Answer: Option 'C'

Presentation layer is responsible for character-code translation, data conversion, data encryption and decryption, and data translation.

DigitalOcean Referral Badge

45.

Which of the following is used to open file menu options in current program?

   A.) Ctrl+F
   B.) Shift+F
   C.) Alt+F
   D.) Alt+Ctrl+F

Answer: Option 'C'

Alt+F

DigitalOcean Referral Badge

46.

What is the term that refers to an ad hidden inside software that you downloaded from an internet site?

   A.) Spam
   B.) Cookie
   C.) Phish
   D.) Adware

Answer: Option 'D'

Adware is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.

DigitalOcean Referral Badge

47.

Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?

   A.) Shareware
   B.) Public domain software
   C.) Application software
   D.) Operating system software

Answer: Option 'D'

An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.

DigitalOcean Referral Badge

48.

Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?

   A.) hacker
   B.) analyst
   C.) instant messenger
   D.) programmer

Answer: Option 'A'

Hacker is someone who seeks and exploits weaknesses in a computer system.

DigitalOcean Referral Badge

49.

Computer language COBOL is appropriate for ______

   A.) Commercial purpose 
   B.) Graphic purpose
   C.) Scientific purpose
   D.) None of these

Answer: Option 'A'

COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.

DigitalOcean Referral Badge

50.

The layer that is the closest to transmission medium.

   A.) transport
   B.) network
   C.) data link
   D.) physical

Answer: Option 'D'

Physical layer is closest to transmission medium. 

DigitalOcean Referral Badge

Computer Questions for IBPS Clerk Mains Download Pdf

Recent Posts