Computer questions asked in IBPS CLERK MAINS 2017(Memory Based)

  • Chicken Fry Biryani

  • 1. The scrambling of code is known as:
   A.) Encryption
   B.) Firewalling
   C.) Scrambling
   D.) Deception

Answer: Option 'A'

Data scrambling is the process to or remove sensitive data. This process is irreversible so that the original data cannot be derived from the scrambled data. Encryption is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text, encrypted data is referred to as cipher text. Scrambling is a technique to achieve encryption of data.

  • 2. Why do you log off from your computer when going out from your office?
   A.) Someone might steal your files, passwords etc.
   B.) In order to save electricity
   C.) logging off is essential to increase performance
   D.) logging off is mandatory you before go out

Answer: Option 'A'

When you log off from the computer, you close your user account but the computer remains on for easy access the next time you log on. To log on, click your user account icon(which must be password protected to prevent unauthorised access) on the Welcome screen.

  • 3. Which is the full form of VoIP?  
   A.) Voice of Internet Power
   B.) Voice over Internet Protocol
   C.) Voice on Internet Protocol
   D.) Very optimized Internet Protocol 

Answer: Option 'B'

Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line.VoIP is enabled by a group of technologies and methodologies used to deliver voice communications over the internet, enterprise local area networks or wide area networks.

  • 4. Which among the following cycle consists of an Input, processing, output and storage as its constituents? 
   A.) Processing
   B.) Output
   C.) Storage
   D.) Input

Answer: Option 'A'

The sequence of events in processing information, which includes (1) input, (2) processing, (3) storage and (4) output.

  • 5. Which of the following is the organized collection of large amount of interrelated data stored in a meaningfully way used for manipulation and updating?   
   A.) Database
   B.) File
   C.) Folder
   D.) Data-mining

Answer: Option 'A'

A database is a collection of information that is organized so that it can easily be accessed, managed, and updated.

  • 6. An act of sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information?
   A.) Phishing
   B.) Spam
   C.) hacking
   D.) cracking

Answer: Option 'A'

The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, online.

  • 7. Which of the following is false about the clock of the system?
   A.) It is the property of the toolbar
   B.) The system can periodically refresh the time by synchronizing with a time source
   C.) System time is the current date and time of day.
   D.) The system keeps time so that your applications have ready access to accurate time.

Answer: Option 'A'

Clock is available property of taskbar.

  • 8. Which of the following character set supports Japanese and Chinese font?
   B.) ASCII
   C.) BCD
   D.) Unicode

Answer: Option 'D'

Unicode is a standard for representing characters as integers. Unlike ASCII, which uses 7 bits for each character, Unicode uses 16 bits, which means that it can represent more than 65,000 unique characters. This is a bit of overkill for English and Western-European languages, but it is necessary for some other languages, such as Greek, Chinese and Japanese. Many analysts believe that as the software industry becomes increasingly global, Unicode will eventually supplant ASCII as the standard character coding format.