Computer Questions for IBPS Clerk Mains 2019


IPv6 does not use ______ type of address

   A.) Broadcast
   B.) Multicast
   C.) Anycast
   D.) None of the mentioned

Answer: Option 'A'



_____is the  a relatively new programming language designed by Microsoft for a wide range of enterprise applications that run on the .NET Framework. 

   A.) RUBY on RAILS
   C.) JAVA
   D.) C#(pronounced C-sharp)

Answer: Option 'D'

An evolution of C and  C++, the C# language is simple, modern, type safe and object oriented. 


Simple mail transfer protocol (SMTP) utilizes ____ as the transport layer protocol for electronic mail transfer.

   A.) TCP
   B.) UDP
   C.) DCCP
   D.) SCTP

Answer: Option 'A'



A______is a combination of a private cloud combined with the use of public cloud services where one or several touch points exist between the environments. 

   A.) Hybrid Cloud
   B.) Dynamic cloud 
   C.) Sharing cloud
   D.) Compressed cloud

Answer: Option 'A'

The goal is to combine services and data from a variety of cloud models to create a unified, automated, and well-managed computing environment.


A set of instructions telling the computer what to do is called- 

   A.) Mentor 
   B.) Instructor 
   C.) Complier 
   D.) Program 

Answer: Option 'D'

A program is a set of instructions that govern functioning of a computer.


____ cloud is a type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture. 

   A.) Private
   B.) public
   C.) distributed
   D.) hybrid

Answer: Option 'A'

Unlike public clouds, which deliver services to multiple organizations, a private cloud is dedicated to a single organization.


An attempt to make a computer resource unavailable to its intended users is called

   A.) denial-of-service attack
   B.) virus attack
   C.) worms attack
   D.) botnet process

Answer: Option 'A'

denial-of-service attack


Codes consisting of light and dark marks which may be optically read, is known as_______. 

   A.) mnemonic
   B.) bar code
   C.) decoder
   D.) All of these

Answer: Option 'B'

Barcode consist of light and dark marks which may be optically read. 


Which of the following is most oriented to scientific programming?

   B.) COBOL
   D.) RUBY

Answer: Option 'A'

FORTRAN stands for Formula Translator.


All Android phones and iPhones have access to a SQL (pronounced ‘sequel’) database called_______

   A.) SQLite
   B.) MySQL
   C.) PostgreSQL 
   D.) Microsoft SQL 

Answer: Option 'A'

SQLite is an in-process library that implements a self-contained, serverless, zero-configuration, transactional SQL database engine. The code for SQLite is in the public domain and is thus free for use for any purpose, commercial or private. SQLite is a compact library.


Programs designed specifically to address general purpose applications and special purpose applications are called-

   A.) Operating system
   B.) System software
   C.) Application software
   D.) Management information system

Answer: Option 'C'

Programs designed specifically to address general purpose applications and special purpose applications are called Application software. 


Firewalls are often configured to block

   A.) UDP traffic
   B.) TCP traffic
   C.) Both (a) and (b)
   D.) None of the mentioned

Answer: Option 'A'

UDP traffic


A ______is an interconnected network of computers infected with malware without the user's knowledge and controlled by cybercriminals. They're typically used to send spam emails, transmit viruses and engage in other acts of cybercrime.

   A.) internet
   B.) Botnet
   C.) Dotnet
   D.) D-Net

Answer: Option 'B'



Which of the following is used to measure the speed of the processor?

   A.) Unit
   B.) Processing speed
   C.) Clock speed
   D.) Memory

Answer: Option 'C'

The operating speed of a computer or its microprocessor, expressed in cycles per second (megahertz) 


____is the process of affecting the visibility of a website or a web page in a web search engine's unpaid results—often referred to as "natural", "organic", or "earned" results.

   A.) SEO
   B.) ESO
   C.) IEEE
   D.) HTTPS

Answer: Option 'A'

SEO is short for Search Engine Optimization


Which key is used to search any data in a computer?

   A.) F1
   B.) F2 
   C.) F3 
   D.) F4 

Answer: Option 'C'

F1: Opens the help page of the working program. F2: Renames a highlighted icon or file. Alt + Ctrl + F2 and Ctrl + F2 give some more functions. F3: Search feature for many programs including web browsers. 


“GUI” stands for-  

   A.) Graphical Universal Interface
   B.) Graphical User Interface
   C.) Graphical Uninstall/install
   D.) General Utility Interface

Answer: Option 'B'

a graphical user interface (GUI), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators 


Which among the following is an important circuitry in a computer system that directs the operation of the processor?

   A.) Memory
   B.) Address Bus
   C.) Accumulator
   D.) Control Unit

Answer: Option 'D'

The Control Unit (CU) is digital circuitry contained within the processor that coordinates the sequence of data movements into, out of, and between a processor's many sub-units.


Since viruses are only a form of software, they primarily infect

   A.) Data
   B.) Hardware
   C.) Peripherals
   D.) Programs 

Answer: Option 'D'

In 1982, a program called "Elk Cloner" was the first personal computer virus to appear "in the wild"—that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skrenta, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. 


Which of the following could be digital input devices for computers?

   A.) Digital camera
   B.) Microphone
   C.) Scanner
   D.) All of the above

Answer: Option 'D'

Digital camera, Microphone and scanner all are the digital input device. 

Computer Questions for IBPS Clerk Mains 2019 Download Pdf

Recent Posts