Computer Aptitude Questions for IBPS Clerk Mains - 20th January 2019

21.

Which of the following contains permanent data and gets updated during the processing of transactions?

   A.) Operating System File
   B.) Transaction file
   C.) Software File
   D.) Master file

Answer: Option 'A'

Operating System File is a type of file that contains permanent data and gets updated later after creation or even during the processing of transactions.

22.

A barcode is ________ code that represents data with bars of varying widths or heights.

   A.) optical
   B.) magnetic
   C.) laser
   D.) read/write

Answer: Option 'A'

A barcode is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.

23.

How should you print a selected area of a worksheet, if you’ll want to print a different area next time?

   A.) On the file menu, point to print area, and then click set print area.
   B.) On the file menu, click print, and then click Print Selection under print settings
   C.) On the view menu, click custom views, then click add
   D.) All of the above

Answer: Option 'B'

User can select an area and then print the selected section by clicking on print selection in the print settings

24.

A vacuum tube (also called a VT, electron tube, a valve) is a device sometimes used to amplify electronic signals.  Vacuum Tubes were used in which generation of Computers?

   A.) 1st Generation
   B.) 2nd Generation
   C.) 3rd Generation
   D.) 4th Generation

Answer: Option 'A'

First Generation computers are characterized by the use of vacuum tubes. These vacuum tubes were used for calculation as well as storage and control. Later, magnetic tapes and magnetic drums were implemented as storage media. The first vacuum tube computer, ENIAC, was developed by US army ordinance to calculate ballistic firing tables in WWII. It had about 17 000 vacuum tubes. 

25.

What is the function of the AutoCorrect feature across all MS Office applications?

   A.) Replacing misspelled words with the correct ones while typing
   B.) Replacing grammatically incorrect words with the correct ones
   C.) Replacing repetitive words with the word ‘same’
   D.) Replacing selected words with the word ‘auto’

Answer: Option 'A'

The AutoCorrect feature is used to correct typo errors and miss-spelled words automatically according to the words given in the list for the AutoCorrect feature.

26.

Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?

   A.) Tactile Haptics
   B.) Biometrics
   C.) Virtualization
   D.) Data Mining

Answer: Option 'A'

Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch. Surface haptics refers to the production of variable forces on a user's finger as it interacts with a surface, such as a touchscreen.

27.

Which IEEE Standards is used for Wi-Fi system?

   A.) 802.11
   B.) 802.10
   C.) 802.2
   D.) 802.1

Answer: Option 'A'

Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area network(LAN) technology designed to provide in-building broadband coverage.

28.

Which among the following are valid filters available in MS Access?

   A.) Filter by form
   B.) Common Filter
   C.) Filter by selection
   D.) All of the above

Answer: Option 'D'

Common filters: To filter for specific values or a range of values.

29.

_____ is the set of programs that enables your computer’s hardware devices and application software to work together. 

   A.) Word processing software
   B.) Utility software
   C.) Memory
   D.) Programming software

Answer: Option 'B'

Utility software is system software designed to help analyze, configure, optimize or maintain a computer.

30.

What is an E-mail?

   A.) An Internet standard, which allow users to upload and download files
   B.) An online area on which a user can converse in written form about any special subject
   C.) Transmission of files and messages through computer network
   D.) A real time typed conversion

Answer: Option 'C'

​Transmission of files and messages through computer network

31.

_________ is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control to modify the software code on the device or install other software that the manufacturer wouldn’t normally allow you to.

   A.) Slash
   B.) Hacking
   C.) Booting
   D.) Rooting   

Answer: Option 'D'

Rooting gives the ability (or permission) to alter or replace system applications and settings, run specialized applications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. Jailbreaking is a term with similar meaning for iOS devices.

32.

Which of the following language defines commands GRANT and REVOKE?

   A.) DDL
   B.) DML
   C.) DCL
   D.) DQL

Answer: Option 'C'

DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema. DCL use two commands to control access- GRANT and REVOKE.

33.

The software that is used to create text based documents is referred as :

   A.) DBMS
   B.) Spreadsheets
   C.) Presentation software
   D.) Word processor 

Answer: Option 'D'

Word processors are used to create text based documents.

34.

Who invented the machine to add numbers quickly and accurately?  

   A.) Joseph Marie Jacquard
   B.) Gottfried Wilhelm von Leibniz
   C.) Blaise Pascal
   D.) Herman Hollerith

Answer: Option 'C'

Blaise Pascal developed a machine that was used to perform additions quickly and accurately. This machine was called the adding machine or Pascaline.

35.

For each attribute of a relation, there is a set of permitted values, called the __________ of that attribute.

   A.) Domain
   B.) Relation
   C.) Set
   D.) Schema

Answer: Option 'A'

Set of permitted values is called the domain of that attribute.
 (Relation is a table. Attributes describe the instances in the row of a database.)

36.

Which of the following units is used to measure the speed of the processor?  

   A.) Kilobytes (KB)
   B.) Gigabytes (GB)
   C.) Gigahertz (GHz)
   D.) Kilobits (Kb)

Answer: Option 'C'

A processor speed is measured in Gigahertz (GHz). 

37.

Which among the following is Microsoft's core set of application programming interfaces (APIs) available in the Microsoft Windows operating systems?

   A.) Kernel
   B.) WinAPI
   C.) Windows ME
   D.) DOS

Answer: Option 'B'

The Windows API, informally WinAPI, is Microsoft's core set of application programming interfaces (APIs) available in the Microsoft Windows operating systems. The name Windows API collectively refers to several different platform mplementations that are often referred to by their own names (for example, Win32 API). The Windows API (Win32) is focused mainly on the programming language C in that its exposed functions and data structures are described in that language in recent versions of its documentation. 

38.

The SubSeven is an example of :

   A.) antivirus
   B.) Trojan horse
   C.) Adware
   D.) Spyware

Answer: Option 'B'

SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

39.

Which of the following key is a minimal super key?

   A.) Primary key
   B.) Alternate key
   C.) Candidate key
   D.) Secondary key

Answer: Option 'C'

​Candidate key

40.

In which topology requires each node to be connected to exactly two other nodes, forming a single continuous pathway for signals?

   A.) Star
   B.) Ring
   C.) Mesh
   D.) Tree

Answer: Option 'B'

A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.


Computer Questions for IBPS Clerk Mains Download Pdf

Recent Posts