Computer Aptitude Questions for IBPS Clerk Mains - 20th January 2019


The abbreviation ISP stands for___

   A.) International spy project
   B.) Indian social planning
   C.) Internet solution provider
   D.) Internet service provider

Answer: Option 'D'

Internet service provider


A barcode is ________ code that represents data with bars of varying widths or heights.

   A.) optical
   B.) magnetic
   C.) laser
   D.) read/write

Answer: Option 'A'

A barcode is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.


Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?

   A.) ROM
   B.) EPROM
   C.) RAM
   D.) Extended memory

Answer: Option 'C'

Most operating Systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.


Which of the following is used to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk?

   A.) Virtual programming
   B.) Spooling
   C.) Caching
   D.) Multi programming

Answer: Option 'B'

Spooling is a technique to hold data temporarily in the computer memory and provide to devices when they need it. The temporary holding area of the memory is sometimes referred to as the buffer. One common example of spooling is printing, where files are stored in the buffer and sent to the printer when it is ready.


Which of the following is used to open file menu options in current program?

   A.) Ctrl+F
   B.) Shift+F
   C.) Alt+F
   D.) Alt+Ctrl+F

Answer: Option 'C'



Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?

   A.) Shareware
   B.) Application software
   C.) Public domain software
   D.) Operating system software

Answer: Option 'D'

An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.


Which of the following topologies has the highest reliability?

   A.) Star topology
   B.) Bus topology
   C.) Ring topology
   D.) Mesh topology

Answer: Option 'D'

In the mesh topology, each computer is connected to the other with a separate physical link in a network. It is most reliable topology as the network does not get down in case one of the nodes is failed.


Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 

   A.) program thievery
   B.) data snatching
   C.) software piracy
   D.) program looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.


EDBIC code can support how many different representation of characters?

   A.) 256
   B.) 149
   C.) 64
   D.) 1024

Answer: Option 'A'

EBCDIC stands for Extended Binary Coded Decimal Interchange Code. EBCDIC is a 8-Bit code with 256 different representations of characters. It is mainly used in mainframe computers.


The main webpage of a website is also known as ­

   A.) Contents Page
   B.) Home Page
   C.) Introduction Page
   D.) First Page

Answer: Option 'B'

A home page is the main page or the introductory page of a website, typically serving as a table of contents for the site.


What is a hyperlink?

   A.) It is a text or image that you can click on to jump to a new document/page.
   B.) It is an input type for multimedia files.
   C.) It is a collection or directory of web pages.
   D.) It is the home page of a site.

Answer: Option 'A'

A hyperlink, or simply a link, is a reference to data that the reader can directly follow either by clicking, tapping, or hovering. Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page.


What is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host?

   A.) Identity Theft
   B.) Forging
   C.) IP Spoofing 
   D.) Pharming

Answer: Option 'C'

​IP Spoofing 


Portrait and Landscape are:

   A.) Page Orientation
   B.) page layout
   C.) page size
   D.) page view

Answer: Option 'A'

Page orientation is the way in which a rectangular page is oriented for normal viewing.


Internet access by transmitting digital data over the wires of a local telephone network is provided by: 

   A.) leased line
   B.) digital subscriber line
   C.) digital signal line
   D.) MODEM

Answer: Option 'B'

Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.


What type of web technology creates an online community where people can make statements and others can read and respond to those statements?

   A.) I-Journal
   B.) Blog
   C.) Podcast
   D.) ASP

Answer: Option 'B'



Which among the following on a computer or terminal keyboard which can be programmed so as to cause an operating system command interpreter or application program to perform certain actions or specific tasks?

   A.) Function Keys
   B.) Caps Lock Key
   C.) Number Keys
   D.) Esc

Answer: Option 'A'

A function key is one of a sequence of special keys labeled "F1" to "F12" (on most keyboards) that can be assigned a specific use to perform certain task.


How many pins are there in a VGA Connector?

   A.) 12
   B.) 10
   C.) 15
   D.) 13

Answer: Option 'C'



Which among the following comes at last in an MS Excel Window?

   A.) Menu Bar
   B.) Task Bar
   C.) Formula Bar
   D.) Status Bar

Answer: Option 'D'

Status Bar


A server can be a computer and storage device dedicated to storing files and it is connected to a _______ to serve other workstations.

   A.) Network
   B.) Node
   C.) Router
   D.) Protocol

Answer: Option 'A'

A server is a computer designed to process requests and deliver data to another computer over the internet or a local network.


What is the full form of EDI?

   A.) Electronic Data Input
   B.) Electric Data Interchange
   C.) Electronic Data Interchange
   D.) Easy Data Interchange

Answer: Option 'C'

Electronic Data Interchange is the full form of EDI

Computer Questions for IBPS Clerk Mains Download Pdf

Recent Posts