Computer Aptitude Questions for IBPS Clerk Mains - 20th January 2019

21.

What is a hyperlink?

   A.) It is a text or image that you can click on to jump to a new document/page.
   B.) It is an input type for multimedia files.
   C.) It is a collection or directory of web pages.
   D.) It is the home page of a site.

Answer: Option 'A'

A hyperlink, or simply a link, is a reference to data that the reader can directly follow either by clicking, tapping, or hovering. Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page.

22.

What is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host?

   A.) Identity Theft
   B.) Forging
   C.) IP Spoofing 
   D.) Pharming

Answer: Option 'C'

​IP Spoofing 

23.

Portrait and Landscape are:

   A.) Page Orientation
   B.) page layout
   C.) page size
   D.) page view

Answer: Option 'A'

Page orientation is the way in which a rectangular page is oriented for normal viewing.

24.

Internet access by transmitting digital data over the wires of a local telephone network is provided by: 

   A.) leased line
   B.) digital subscriber line
   C.) digital signal line
   D.) MODEM

Answer: Option 'B'

Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.

25.

What type of web technology creates an online community where people can make statements and others can read and respond to those statements?

   A.) I-Journal
   B.) Blog
   C.) Podcast
   D.) ASP

Answer: Option 'B'

​Blog

26.

Which among the following on a computer or terminal keyboard which can be programmed so as to cause an operating system command interpreter or application program to perform certain actions or specific tasks?

   A.) Function Keys
   B.) Caps Lock Key
   C.) Number Keys
   D.) Esc

Answer: Option 'A'

A function key is one of a sequence of special keys labeled "F1" to "F12" (on most keyboards) that can be assigned a specific use to perform certain task.

27.

How many pins are there in a VGA Connector?

   A.) 12
   B.) 10
   C.) 15
   D.) 13

Answer: Option 'C'

​15

28.

Which among the following comes at last in an MS Excel Window?

   A.) Menu Bar
   B.) Task Bar
   C.) Formula Bar
   D.) Status Bar

Answer: Option 'D'

Status Bar

29.

A server can be a computer and storage device dedicated to storing files and it is connected to a _______ to serve other workstations.

   A.) Network
   B.) Node
   C.) Router
   D.) Protocol

Answer: Option 'A'

A server is a computer designed to process requests and deliver data to another computer over the internet or a local network.

30.

What is the full form of EDI?

   A.) Electronic Data Input
   B.) Electric Data Interchange
   C.) Electronic Data Interchange
   D.) Easy Data Interchange

Answer: Option 'C'

Electronic Data Interchange is the full form of EDI

31.

What is a Firewall in Computer Network?

   A.) The physical boundary of Network
   B.) An operating System of Computer Network
   C.) A system designed to prevent unauthorized access
   D.) A web browsing Software

Answer: Option 'C'

A system designed to prevent unauthorized access

32.

In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?

   A.) Star
   B.) Ring
   C.) Mesh
   D.) Tree

Answer: Option 'B'

A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.

33.

Which among the following appears in a URL whenever you search anything on a Search Engine?

   A.) google
   B.) https://
   C.) bing
   D.) en

Answer: Option 'B'

Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted.

34.

Which among the following is the reboot where the power to the system is physically turned off and back on again, causing an initial boot of the machine?

   A.) Toggle
   B.) Cold booting
   C.) Warm booting
   D.) Logging off

Answer: Option 'B'

​Cold booting

35.

A virus that migrates freely within a large population of unauthorized email user is called a __________.

   A.) worm
   B.) flame war
   C.) macro
   D.) plagiarism

Answer: Option 'C'

A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications)

36.

Which protocol is used to convert IP addresses to MAC addresses?

   A.) IP
   B.) RARP
   C.) In ARP
   D.) ARP

Answer: Option 'D'

The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses.

37.

Which IEEE Standards is used for Wi-Fi system?

   A.) 802.11
   B.) 802.1
   C.) 802.2
   D.) 802.3

Answer: Option 'A'

Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area network(LAN) technology designed to provide in-building broadband coverage.

38.

Which of the following key is a minimal super key?

   A.) Primary key
   B.) Alternate key
   C.) Candidate key
   D.) Secondary key

Answer: Option 'C'

​Candidate key

39.

The abbreviation ISP stands for______

   A.) International spy project
   B.) Indian social planning
   C.) Internet solution provider
   D.) Internet service provider

Answer: Option 'D'

An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.

40.

A barcode is ________ code that represents data with bars of varying widths or heights.

   A.) optical
   B.) magnetic
   C.) laser
   D.) read/write

Answer: Option 'A'

A barcode is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.


Computer Questions for IBPS Clerk Mains Download Pdf

Recent Posts