Computer Aptitude Questions for IBPS PO Mains 2017

Dear Readers,

Computer Questions for IBPS RRB Mains 2017

IBPS has introduced Computer Aptitude this year (clubbed with Reasoning Section) in the Mains Examination of Probationary Officer Recruitment. Aspirants preparing for SBI must be familiar with Computer Aptitude Section. You must prepare basics of Computer Knowledge for this section to score well. The only difference between Computer Aptitude and Computer Awareness/Knowledge is the practical approach of questions asked in Computer Aptitude. Practice with these 15 questions of Computer Aptitude for IBPS PO Mains 2017 Exam. 

Q1. Which among the following is Android’s latest OS?
(a) Gingerbread
(b) Oreo
(c) Nougat
(d) Lollipop
(e) Marshmallow

S1. Ans.(b)
Sol. Android version 8.0 nicknamed Android Oreo is the latest version of Operating System released by Google in August 2017.

Q2. Which among the following statement is not true about NFC or NFC Devices?
(a) NFC is a set of communication protocols
(b) NFC devices are used in contactless payment systems
(c) NFC tags are passive data stores which can be read, and under some circumstances written to, by an NFC device.
(d) NFC has a significant disadvantage over Bluetooth i.e. the longer set-up time.
(e) NFC tags can be custom-encoded by their manufacturers

S2. Ans. (d)
Sol. NFC (Near-field communication) devices have shorter set up time in comparison to Bluetooth.

Q3. Which among the following is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it?
(a) Desktop Virtualization
(b) Augmented Reality
(c) Social Networking
(d) Real-Time OS
(e) CSMA/CA

S3. Ans. (a)
Sol. Desktop virtualization, often called client virtualization, is a virtualization technology used to separate a computer desktop environment from the physical computer. Desktop virtualization is considered a type of client-server computing model because the "virtualized" desktop is stored on a centralized, or remote, server and not the physical machine being virtualized. A software that can be used for this task is VMWare.

Q4. e-Governance is generally understood as the use of Information and Communication Technology at all the level of the Government to provide services to the citizens. Which among the following are the types of interactions in e-Governance?
(a) G2B
(b) G2C
(c) G2E
(d) G2G
(e) All of the above

S4. Ans. (e)
Sol. e-Governance facilitates interaction between different stake holders in governance. These interactions may be described as follows:

G2G (Government to Government)
G2C (Government to Citizens)
G2B (Government to Business)
G2E (Government to Employees)

Q5. Which among the following is a technology commonly used in mobile devices to recreate the sense of touch by applying forces, vibrations, or motions to the user?
(a) Tactile Haptics
(b) Biometrics
(c) Virtualization
(d) Data Mining
(e) None of the above

S5. Ans. (a)
Sol. Tactile haptic feedback is common in cellular devices. Handset manufacturers have included different types of haptic technologies in their devices; in most cases, this takes the form of vibration response to touch. Surface haptics refers to the production of variable forces on a user's finger as it interacts with a surface, such as a touchscreen.

Q6. __________ is the process of allowing users of smartphones, tablets and other devices running the Android mobile operating system to attain privileged control to modify the software code on the device or install other software that the manufacturer wouldn’t normally allow you to.
(a) Slash
(b) Hacking
(c) Jailbreaking
(d) Booting
(e) Rooting

S6. Ans. (e)
Sol. Rooting gives the ability (or permission) to alter or replace system applications and settings, run specialized applications ("apps") that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user. Jailbreaking is a term with similar meaning for iOS devices.

Q7. Which among the following is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules?
(a) Antivirus
(b) Bug
(c) Firewall
(d) None of the above
(e) All of the above

S7. Ans. (c)
Sol. Firewalls have been a first line of defense in network security. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet.

Q8. Which among the following is an existing social networking platform?
(a) Google+
(b) Yahoo
(c) Zapak
(d) Bing
(e) Explorer

S8. Ans. (a)
Sol. Google+ is a social networking platform by Google. Social networking is the practice of expanding the number of one's business and/or social contacts by making connections through individuals, often through social media sites such as Facebook, Twitter, LinkedIn and Google+.

Q9. What is the current version of IMAP?
(a) IMAP version 2
(b) IMAP version 3
(c) IMAP version 4
(d) IMAP version 5
(e) IMAP version 6

S9. Ans.(c)
Sol. IMAP is an application layer protocol that allows an e-mail client to access an e-mail on a remote mail server. The current version, IMAP version 4, is defined by RFC 3501.

Q10. The program that is used by search engines to search the Internet for documents using their Web addresses is known as : 
(a) Bing
(b) MSN
(c) Spider
(d) Google
(e) None of these

S10. Ans.(c)
Sol. Spider is an important element of a search engine that browses the Internet in a systematic manner.

Q11. Which of the following software posts unwanted advertisements on client’s computer?
(a) Virus
(b) Malware
(c) Worm
(d) Adware
(e) Logic bombs

S11. Ans.(d)
Sol. Adware is a software that is used to post unwanted advertisements. Generally, these advertisements are posted as popups.

Q12. __________ is a program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.
(a) Trojan horse
(b) Adware
(c) Spyware
(d) Worm
(e) Viruses

S12. Ans.(a)
Sol. Trojan horse is a malicious program which looks like a normal program and is accompanied with useful applications like computer games. When you run the game, the Trojan horse gets activated and destroys the information in the background.

Q13. What is gutter margin?
(a) Margin that is added to the left margin when printing
(b) Margin that is added to right margin when printing
(c) Margin that is added to the binding side of page when printing
(d) Margin that is added to the outside of the page when printing
(e) None of these

S13. Ans (c)
Sol. A gutter margin setting adds extra space to the side margin or top margin of a document that you plan to bind. A gutter margin helps ensure that text isn't obscured by the binding.

Q14. If you wish to extend the length of the network without having the signal degrade, you would use a _____. 
(a) Repeater
(b) Router
(c) Gateway
(d) Switch
(e) None of these

S14. Ans. (a)
Sol. A repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances.

Q15. Which disk is used to cold boot a PC?  
(a) Setup disk
(b) System disk
(c) Diagnostic Disk
(d) Program disk
(e) None of the above

S15. Ans. (b)
Sol.  System disk is used to cold boot a PC.



Print Friendly and PDF