SBI Bank PO Exam Computer Knowledge - Test 2

1.

It is the set of programs that enables your computer's hardware device and application software to work together.

   A.) management
   B.) processing
   C.) utility
   D.) system software

Answer: Option 'D'

system software

2.

How many bytes are there in one gigabyte?

   A.) 103 bytes
   B.) 106 bytes
   C.) 109 bytes
   D.) 1012 bytes

Answer: Option 'C'

109 bytes

3.

An alternate name for the completely interconnected network topology is

   A.) star
   B.) tree
   C.) mesh
   D.) ring

Answer: Option 'C'

mesh

4.

Like a virus, it is a self-replicating program. It also propagates through computer network.

   A.) Spyware
   B.) Worm
   C.) Cracker
   D.) Phishing Scam

Answer: Option 'D'

Phishing Scam

5.

_______ acts as temporary high speed holding area between the memory and the CPU there by improving processing capabilities.

   A.) ROM
   B.) RAM
   C.) Temporary memory
   D.) Cache memory

Answer: Option 'D'

Cache memory

6.

The user generally applies _________ to access mainframe or super computer.

   A.) node
   B.) terminal
   C.) desktop
   D.) hand held

Answer: Option 'B'

terminal

7.

The ______ program is used to convert mnemonic code to machine code.

   A.) debug
   B.) C ++
   C.) FORTRAN
   D.) assembler

Answer: Option 'D'

assembler

8.

Which of the following is appropriate method to shutdown computer?

   A.) Click 'start' then select 'shut down'
   B.) Click 'start' then select 'restart'
   C.) Click 'start' then switch user
   D.) Switch off monitor

Answer: Option 'A'

Click 'start' then select 'shut down'

9.

Periodically adding, changing and deleting file records is called _______ file.

   A.) updating
   B.) upgrading
   C.) restructuring
   D.) renewing

Answer: Option 'A'

updating​

10.

It is a self-replicating program that infects computer and spreads by inserting copies of itself into other executable code or documents.

   A.) Keylogger
   B.) Worm
   C.) Virus
   D.) Cracker

Answer: Option 'B'

Worm

11.

URL stands for

   A.) Uniform Read Locator
   B.) Uniform Resource Locator
   C.) Unicode Research Location
   D.) Unicode Research Locator

Answer: Option 'B'

Uniform Resource Locator

12.

In files, there is a key associated with each record which is used to differentiate among different records. For every file, there is at least one set of keys that is unique. Such a key is called

   A.) unique key
   B.) prime attribute
   C.) index key
   D.) primary key

Answer: Option 'D'

primary key

13.

Grouping and processing all of a firm's transactions at one time, is called

   A.) a database management system
   B.) batch processing
   C.) a real time system
   D.) an on-time system

Answer: Option 'B'

batch processing

14.

An inter-company network which used to distribute information, documents files and database, is called as

   A.) LAN
   B.) Switch
   C.) WAN
   D.) MAN

Answer: Option 'A'

LAN

15.

Which of the following will be used if a sender of E-mail wants to bold, italics etc the text message?

   A.) Plain format
   B.) Reach format
   C.) Rich text
   D.) Reach signature

Answer: Option 'C'

Rich text

16.

DBMS is

   A.) collection of data
   B.) set of programs to access those data
   C.) set of programs to update those data
   D.) All of the above

Answer: Option 'D'

All of the above

17.

Which of the following components is the most essential for the computer system to work?

   A.) Input system
   B.) Output system
   C.) Storage system
   D.) CPU

Answer: Option 'D'

CPU

18.

Which is the best position for operating the mouse?

   A.) Tail away from the user
   B.) Tail towards the user
   C.) Tail facing the right
   D.) Tail facing the left

Answer: Option 'B'

Tail towards the user

19.

This component is required to process data into information and consists of integrated circuits.

   A.) Hard Disk
   B.) RAM
   C.) CPU
   D.) ROM

Answer: Option 'C'

CPU

20.

Key to represent relationship between tables is called

   A.) primary key
   B.) secondary key
   C.) foreign key
   D.) composite key

Answer: Option 'C'

foreign key


Computer Knowledge SBI set 2 Download Pdf

Recent Posts