Home   »   Computer Aptitude Questions for SBI PO/CLERK...

Computer Aptitude Questions for SBI PO/CLERK Mains Exam: 12th July

Dear Aspirants,

Computer Aptitude Questions for SBI PO/CLERK Mains Exam: 12th July |_2.1
Computer efficiency is now important in almost every stream and it is important for every aspirant to clear computer knowledge basics because it is an important section in bank recruitment Examination specially Mains Examination. As, SBI PO and Clerk Mains exam are approaching Computer Knowledge section can help you to improve your overall score if in case other sections are tougher than the expectation. Moreover, this section will help you in Bank of Baroda Exam too. Here is a quiz on Computer Knowledge that is being provided by Adda247 to help you ace graceful marks in SBI PO and BOB exam. 


Q1. Which protocol is used to convert IP addresses to MAC addresses?
(a) IP
(b) RARP
(c) In ARP
(d) ARP
(e) None of these

Show Answer
S1. Ans.(d)
Sol. The Address Resolution Protocol (ARP) feature performs a required function in IP routing. ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address. ARP maintains a cache (table) in which MAC addresses are mapped to IP addresses.


Q2. Which IEEE Standards is used for Wi-Fi system?
(a) 802.11
(b) 802.1
(c) 802.2
(d) 802.3
(e) 802.10


Show Answer
S2. Ans.(a)
Sol.  Wi-Fi is based on the IEEE 802.11 family of standards and is primarily a local area network(LAN) technology designed to provide in-building broadband coverage.


Q3. Which of the following key is a minimal super key?
(a) Primary key
(b) Alternate key
(c) Candidate key
(d) Secondary key
(e) None of these


Show Answer
S3. Ans.(c)
Sol. A candidate key is a column, or set of columns, in a table that can uniquely identify any database record without referring to any other data. Each table may have one or more candidate keys, but one candidate key is unique, and it is called the primary key. Candidate key is a minimal super key.


Q4. Which of the following language defines commands GRANT and REVOKE?
(a) DDL
(b) DML
(c) DCL
(d) DQL
(e) SQL


Show Answer
S4. Ans.(c)
Sol. DCL (Data Control Language) is used to control the user access to the database, tables, views, procedures, functions and packages. Using DCL command, it allows or restricts the user from accessing data in database schema. DCL use two commands to control access- GRANT and REVOKE.


Q5. The abbreviation ISP stands for___
(a) International spy project
(b) Indian social planning
(c) Internet solution provider
(d) Internet service provider
(e) None of these


Show Answer
S5. Ans.(d)
Sol. An Internet service provider (ISP) is an organization that provides services accessing and using the Internet. Internet service providers may be organized in various forms, such as commercial, community-owned, non-profit, or otherwise privately owned.


Q6. A barcode is ________ code that represents data with bars of varying widths or heights.
(a) optical
(b) magnetic
(c) laser
(d) read/write
(e) None of these


Show Answer
S6. Ans.(a)
Sol. A barcode is an optical, machine-readable, representation of data; the data usually describes something about the object that carries the barcode.


Q7. Virtual memory allocates hard disk space to supplement the immediate, functional memory capacity of what?
(a) ROM
(b) EPROM
(c) The registers
(d) Extended memory
(e) RAM


Show Answer
S7. Ans.(e)
Sol. Most operating Systems support virtual memory, which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.


Q8. Which of the following contains permanent data and gets updated during the processing of transactions?
(a) Operating System File
(b) Transaction file
(c) Software File
(d) Master file
(e) Any File


Show Answer
S8. Ans.(a)
Sol. Operating System File is a type of file that contains permanent data and gets updated later after creation or even during the processing of transactions.

Q9. Which of the following is used to transfer data intended for a peripheral device into a disk so that it can be transmitted to the peripheral device at a more suitable time or in bulk?  
(a) Virtual programming
(b) Multi programming
(c) Caching
(d) Multitasking
(e) Spooling


Show Answer
S9. Ans.(e)
Sol. Spooling is a technique to hold data temporarily in the computer memory and provide to devices when they need it. The temporary holding area of the memory is sometimes referred to as the buffer. One common example of spooling is printing, where files are stored in the buffer and sent to the printer when it is ready.


Q10.Decryption & Encryption of data are the responsibility of which layer.
(a) Physical
(b) Data Link
(c) Presentation
(d) Session
(e) Application


Show Answer
S10. Ans.(c)
Sol. Presentation layer is responsible for character-code translation, data conversion, data encryption and decryption, and data translation.


Q11.Which of the following is used to open file menu options in current program?
(a) Ctrl+F
(b) Shift+F
(c) Alt+F
(d) Alt+Ctrl+F
(e) Tab+F


Show Answer
S11. Ans.(c)


Q12.What is the term that refers to an ad hidden inside software that you downloaded from an internet site?
(a) Spam
(b) Cookie
(c) Phish
(d) Adware
(e) None of these


Show Answer
S12. Ans.(d)
Sol. Adware is software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.


Q13.Which of the following is the type of software that controls the internal operations in the computer and controls how the computer works with all its parts?
(a) Shareware
(b) Public domain software
(c) Application software
(d) Operating system software
(e) None of these


Show Answer
S13. Ans.(d)
Sol. An operating system (OS) is a program or software that manages and coordinates the functions of all the components of a computer. It also acts as an interface between the user and the hardware of a computer.


Q14.Term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
(e) spammer


Show Answer
S14. Ans.(a)
Sol. Hacker is someone who seeks and exploits weaknesses in a computer system.


Q15.Computer language COBOL is appropriate for—
(a) Commercial purpose
(b) Graphic purpose
(c) Scientific purpose
(d) All
(e) None of these


Show Answer
S15. Ans.(a)
Sol. COBOL (Common Business Oriented Language) is a programming language that reads like regular English and is often used for business and administrative purposes.