Computer Awareness Questions for SBI PO

1.

A vacuum tube (also called a VT, electron tube, a valve ) is a device sometimes used to amplify electronic signals.  Vacuum Tubes were used in which generation of Computers?

   A.) 1st Generation
   B.) 2nd Generation
   C.) 3rd Generation
   D.) 4th Generation

Answer: Option 'A'

First Generation computers are characterised by the use of vacuum tubes. These vacuum tubes were used for calculation as well as storage and control. Later, magnetic tapes and magnetic drums were implemented as storage media. The first vacuum tube computer, ENIAC, was developed by US army ordinance to calculate ballistic firing tables in WWII. It had about 17 000 vacuum tubes.

2.

__________ ensures secure transfer of data over an unsecured network, such as the Internet.

   A.) Antivirus
   B.) Hacking
   C.) Cracking 
   D.) Cryptography

Answer: Option 'D'

In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.

3.

In Computer programming API is set of subroutine definitions, protocols, and tools for building software and applications. Which among the following is an application programming interface for the programming language Java, which defines how a client may access a database?

   A.) J2EE
   B.) JDK
   C.) JAVA SE
   D.) JDBC

Answer: Option 'D'

Java Database Connectivity (JDBC) is an application programming interface (API) for the programming language Java, which defines how a client may access a database. It is part of the Java Standard Edition platform, from Oracle Corporation.

4.

Which of the following forms a part of a search engine?  

   A.) Spiders or Web crawlers 
   B.) Indexing software 
   C.) Search algorithm 
   D.) All of these 

Answer: Option ''

The three important elements of a search engine are spiders or Web crawlers, indexing software and search algorithm.

5.

Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?

   A.) program thievery
   B.) data snatching
   C.) software piracy
   D.) program looting

Answer: Option 'C'

Software piracy is the illegal copying, distribution, or use of software.

Computer Awareness Questions for SBI PO Download Pdf

Recent Posts