On account of the disruption in education due to the corona pandemic, we're are providing a 7-day Free trial of our platform to teachers. Know More →

IBPS

Explore popular questions from Computer Awareness for IBPS. This collection covers Computer Awareness previous year IBPS questions hand picked by experienced teachers.

Select Subject

Quantitative Aptitude

General Awareness

English Language

Computer Awareness

Reasoning

Hindi Language

Computer Awareness

Correct Marks

Incorrectly Marks

Q 1. Which of the following is a collection of protocol designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level?

A

PGP

B

SSL

C

TLS

IPSec

E

HTTP

Explanation

IPSec is an Internet Engineering Task Force (IETF) standard suite of protocols that provides data authentication, integrity, and confidentiality as data is transferred between communication points across IP networks. IPSec provides data security at the IP packet level. A packet is a data bundle that is organized for transmission across a network, and it includes a header and payload (the data in the packet). IPSec emerged as a viable network security standard because enterprises wanted to ensure that data could be securely transmitted over the Internet. IPSec protects against possible security exposures by protecting data while in transit.

Correct Marks

Incorrectly Marks

Q 2. Which of the following is provided by DHCP to the client?

IP address

B

MAC address

C

URL

D

Security

E

None of these

Explanation

DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device, or node, on a network so they can communicate using IP.

Correct Marks

Incorrectly Marks

Q 3. What is the output of the given program:

He

B

Say

C

SayHe

D

HeSay

E

Compile error

Correct Marks

Incorrectly Marks

Q 4. Which of the following operator in c is used to explicitly to convert the value from one type to another?

A

Bitwise

Cast

C

Logical

D

Arithmetic

E

Comma

Explanation

Cast operator can be used to explicitly convert the value of an expression to a different data type. To do so, the name of the data type to which the conversion is to be made is enclosed in parenthesis and placed directly to the left of the expression whose value is to be converted.

Correct Marks

Incorrectly Marks

Q 5. Which of the following mode is used whenever either end of a security association is gateway.

Tunnel

B

Encapsulating

C

Transport

D

Gateway

E

Port

Explanation

The Tunnel mode is used whenever either end of a security association is a gateway. Therefore, between two firewalls the tunnel mode is always used.

Correct Marks

Incorrectly Marks

Q 6. IP address 128.167.152.2 is belongs to which class?

A

A

B

C

C

D

D

E

None

Explanation

Range of Class B address is 128.0.0.0 to 191.255.255.255

Correct Marks

Incorrectly Marks

Q 7. The parameter which gives the probability of the transport layer itself spontaneously terminating a connection due to internal problem?

A

Protection

Resilience

C

Option negotiation

D

Transfer failure

E

None

Explanation

Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.

Correct Marks

Incorrectly Marks

Q 8. Which of the following is a single communication channel that is shared by all the users on the network?

A

Point-to-Point

Broadcast Network

C

Protocol

D

PAN

E

None of these

Explanation

Broadcast network are characterized by the presence of a single communication channel that is shared by all users. Messages, in some cases called packets, are sent by each user and received by all the others.

Correct Marks

Incorrectly Marks

Q 9. Which of the following is a user-defined data type that consists of integral constants in C++?

A

Pnum

B

Snun

C

Unum

Enum

E

None of these

Explanation

An enumeration provides context to describe a range of values which are represented as named constants and are also called enumerators. In the original C and C++ enum types, the unqualified enumerators are visible throughout the scope in which the enum is declared.

Correct Marks

Incorrectly Marks

Q 10. Which type of constructor used to provide different values to distinct objects?

A

Parallel constructor

B

Side constructor

C

default constructor

parameterized constructor

E

None of these

Explanation

A constructor which has parameters is called parameterized constructor. It is used to provide different values to distinct objects.

Correct Marks

Incorrectly Marks

Q 11. Which of the following TCP/IP protocol is used for the file transfer with minimal capability and minimal overhead?

A

RARP

B

FTP

TFTP

D

TELNET

E

ARP

Explanation

TFTP, or Trivial File Transfer Protocol, is a simple high-level protocol for transferring data servers use to boot diskless workstations, X-terminals, and routers by using User Data Protocol (UDP).

Correct Marks

Incorrectly Marks

Q 12. Which of the following attribute in DBMS can be subdivided into two or more other attributes?

A

Single valued attribute

B

Multi-valued attribute

C

Stored attribute

Composite attribute

E

Atomic attribute

Explanation

Composite attribute can be further divided into more attributes. For example: Entity Employee Name can be divided into sub divisions like FName, MName, LName.

Correct Marks

Incorrectly Marks

Q 13. Which of the following segments includes in error control mechanism of TCP protocol?

A

Detecting corrupted segments

B

Lost segments

C

Out-of-order segments

D

Duplicate segments

All of the above

Explanation

TCP is a reliable transport layer protocol. TCP provides reliability using error control. Error control includes mechanisms for detecting corrupted segments, lost segments, out-of-order segments, and duplicated segments. Error control also includes a mechanism for correcting errors after they are detected. Error detection and correction in TCP is achieved through the use of three simple tools: checksum, acknowledgment, and time-out.

Correct Marks

Incorrectly Marks

Q 14. Which algorithm can't be used to optimally sort a single linked list with random values?

A

Insertion sort

B

Merge sort

C

Quick sort

Heap sort

E

Bubble sort

Correct Marks

Incorrectly Marks

Q 15. Which of the following is represented using an underlined ellipse symbol in ER Diagram?

A

Attribute

B

Weak Entity

C

Relation

Key Attribute

E

None of these

Explanation

Key attribute represents the main characteristic of an Entity. It is used to represent Primary key. Ellipse with underlying line represents Key Attribute.

Correct Marks

Incorrectly Marks

Q 16. Which of the following data structure follow Last-in-first-out operation?

Stack

B

Doubly linked list

C

Linked list

D

Queue

E

None of these

Explanation

Stack is an ordered list in which, insertion and deletion can be performed only at one end that is called top. Stack is a recursive data structure having pointer to its top element. Stacks are sometimes called as Last-In-First-Out (LIFO) lists i.e. the element which is inserted first in the stack, will be deleted last from the stack.

Correct Marks

Incorrectly Marks

Q 17. Which of the following sorting algorithm follow divide and conquer approach?

A

Bubble sort

Quick sort

C

Bucket sort

D

Insertion sort

E

All of the above

Explanation

Quick sort is the widely used sorting algorithm that makes n log n comparisons in average case for sorting of an array of n elements. This algorithm follows divide and conquer approach.

Correct Marks

Incorrectly Marks

Q 18. Which of the following is the time complexity of selection sort?

A

O(log n)

B

O(1)

C

O(n log n)

O(n^2)

E

O(nk)

Correct Marks

Incorrectly Marks

Q 19. When existence of one or more rows in a table implies one or more other rows in the same table, then which type of dependency occurs in database?

A

Transitive Dependency

Multivalued Dependency

C

Fully-functionally Dependency

D

Partial Dependency

E

Functional Dependency

Explanation

A multivalued dependency occurs when the presence of one or more rows in a table implies the presence of one or more other rows in that same table. Put another way, two attributes (or columns) in a table are independent of one another, but both depend on a third attribute.

Correct Marks

Incorrectly Marks

Q 20. Which of the following is used to remove database anomalies?

Normalization

B

Functional dependency

C

Database Modeling

D

Transaction

E

Data model schema

Explanation

Normalization is a process of organizing the data in database to avoid data redundancy, insertion anomaly, update anomaly & deletion anomaly. 1NF, 2NF, 3NF and BCNF are types of normal forms.

Correct Marks

Incorrectly Marks

Q 21. In RDMS, concept of Join Dependency is related to which normal form?

A

1 Normal Form

B

BCNF

PJ/NF

D

2 Normal Form

E

3 Normal Form

Explanation

5NF is also known as Project-join normal form (PJ/NF). A relation is in 5NF if it is in 4NF and not contains any join dependency and joining should be lossless. 5NF is satisfied when all the tables are broken into as many tables as possible in order to avoid redundancy.

Correct Marks

Incorrectly Marks

Q 22. In which mechanism one class acquires the property of another class?

A

Abstraction

Inheritance

C

Polymorphism

D

Encapsulation

E

Method

Explanation

The process by which one class acquires the properties (data members) and functionalities(methods) of another class is called inheritance. The aim of inheritance is to provide the reusability of code so that a class has to write only the unique features and rest of the common properties and functionalities can be extended from another class.

Correct Marks

Incorrectly Marks

Q 23. Which of the following is true about compaction in operating system?

A

It is a technique for overcoming fatal error

B

It is a page management technique

It helps to solve the problem of fragmentation

D

Allocate the address of physical memory

E

None of these

Explanation

Compaction refers to combining all the empty spaces together and processes. Compaction helps to solve the problem of fragmentation, but it requires too much of CPU time.

Correct Marks

Incorrectly Marks

Q 24. Which Boolean operation is equivalent to Union function?

A

AND

OR

C

NOT

D

NAND

E

EXNOR

Correct Marks

Incorrectly Marks

Q 25. What will be the result of given code?
int main()
{
printf(5+"Programming");
}

A

error

B

Progr

amming

D

Pro

E

Gramming

Explanation

The statement printf(5+'Programming') skips 5 characters of the followed string and then print string.