Computer Awareness Questions for SBI PO

  • 1. __________ ensures secure transfer of data over an unsecured network, such as the Internet.
   A.) Antivirus
   B.) Hacking
   C.) Cracking 
   D.) Cryptography

Answer: Option 'D'

In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.

  • 2. Which among the following is not a valid key in a relational database model?
   A.) Primary Key
   B.) Candidate Key
   C.) Foreign Key
   D.) Track Key

Answer: Option 'D'

All other are valid keys except for track key. 

  • 3. The SubSeven is an example of :
   A.) antivirus
   B.) Spyware
   C.) Spam
   D.) Trojan horse

Answer: Option 'D'

SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

  • 4. Which of the following is not a hardware device?
   A.) Storage Devices
   B.) Output Devices
   C.) MS DOS
   D.) CPU

Answer: Option 'C'

MS DOS is an acronym for Microsoft Disk operating system.

  • 5. What is a simulated experience generated by a computer called; like visiting the outer space or stepping on Moon?
   A.) Extended Reality
   B.) Virtual Reality
   C.) Augmented Reality
   D.) Eavesdropping

Answer: Option 'B'

Virtual reality basically means 'near-reality’; it usually refers to a specific type of reality emulation which is simulated experience generated by a computer.

  • 6. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
   A.) program thievery
   B.) data snatching
   C.) software piracy
   D.) program looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.

  • 7. In Computer programming API is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is an application programming interface for the programming language Java, which defines how a client may access a database?
   A.) J2EE
   B.) JDK
   C.) JAVA SE
   D.) JDBC

Answer: Option 'D'

Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.

  • 8. A vacuum tube (also called a VT, electron tube, a valve ) is a device sometimes used to amplify electronic signals.  Vacuum Tubes were used in which generation of Computers?
   A.) 1st Generation
   B.) 2nd Generation
   C.) 3rd Generation
   D.) 4th Generation

Answer: Option 'A'

First Generation computers are characterised by the use of vacuum tubes. These vacuum tubes were used for calculation as well as storage and control. Later, magnetic tapes and magnetic drums were implemented as storage media. The first vacuum tube computer, ENIAC, was developed by US army ordinance to calculate ballistic firing tables in WWII. It had about 17 000 vacuum tubes.

  • 9. To allow someone else to schedule your meetings and appointments, ______ feature of Outlook is used. 
   A.) Monthly calendar 
   B.) Event manager
   C.) Messenger 
   D.) Delegate Access

Answer: Option 'D'

Delegate Access is a more advanced feature than just sharing your Outlook folders. If you want to grant additional permissions, such as allowing a delegate the ability to create e-mail messages or respond to meeting requests on your behalf, you must use Delegate Access.

  • 10. Which of the following forms a part of a search engine?  
   A.) Spiders or Web crawlers 
   B.) Indexing software 
   C.) Search algorithm 
   D.) All of these 

Answer: Option ''

The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.