Computer Aptitude Questions for IBPS Clerk Mains - 20th January 2019

  • Chicken Fry Biryani

  • 1. Computer language COBOL is appropriate for _____
   A.) Graphic purpose
   B.) Scientific purpose
   C.) Commercial purpose 
   D.) All 

Answer: Option 'C'

COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.

  • 2. Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
   A.) hacker
   B.) instant messenger
   C.) analyst
   D.) spammer

Answer: Option 'A'

Hacker is someone who seeks and exploits weaknesses in a computer system.

  • 3. What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
   A.) Phish
   B.) Cookie
   C.) Adware
   D.) Spam

Answer: Option 'C'

Adware is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.

  • 4. Decryption & Encryption of data are the responsibility of which layer.
   A.) Application
   B.) Presentation
   C.) Physical
   D.) Data Link

Answer: Option 'B'

Presentation layer is responsible for character-code translation, data conversion, data encryption and decryption, and data translation.

  • 5. Which of the following contains permanent data and gets updated during the processing of transactions?
   A.) Operating System File
   B.) Transaction file
   C.) Software File
   D.) Master file

Answer: Option 'A'

Operating System File is a type of file that contains permanent data and gets updated later after creation or even during the processing of transactions.

  • 6. A barcode is ________ code that represents data with bars of varying widths or heights.
   A.) optical
   B.) read/write
   C.) magnetic
   D.) laser

Answer: Option 'A'

optical

  • 7. Which of the following language defines commands GRANT and REVOKE?
   A.) DDL
   B.) DML
   C.) DCL
   D.) DQL

Answer: Option 'C'

DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema. DCL use two commands to control access- GRANT and REVOKE.

  • 8. Which IEEE Standards is used for Wi-Fi system?
   A.) 802.11
   B.) 802.10
   C.) 802.2
   D.) 802.1

Answer: Option 'A'

Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area network(LAN) technology designed to provide in-building broadband coverage.

  • 9. Which protocol is used to convert IP addresses to MAC addresses?
   A.) IP
   B.) RARP
   C.) In ARP
   D.) ARP

Answer: Option 'D'

The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses.

  • 10. Which of the following key is a minimal super key?
   A.) Primary key
   B.) Alternate key
   C.) Candidate key
   D.) Secondary key

Answer: Option 'C'

A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.