Computer Knowledge/ Computer Awareness SBI PO Mains 2015 Model Test Paper - 5 Multiple Choice Questions




Here we have published 15 multiple choice questions (MCQs) based on computer knowledge paper for SBI PO Mains online exam 2015 for practice purpose with complete answer key. Hope you find it helpful and we wish you all the best for success in SBI PO exam.
Computer Knowledge/ Computer Awareness SBI PO Mains 2015 Model Test Paper - 2


Computer Knowledge SBI PO 2015 MCQs Model Test Paper -5


Q.1. A……………..sometimes called a boot sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.

A) System virus
B) Trojan horse virus
C) File virus
D) Macro virus
E) None of these




Q.2. Which kind of lock includes a keypad that can be used to control access into areas?

A) Cipher
B) Warded
C) Device
D) Tumbler
E) Typelock




Q.3. The term, "hypertext", means—

A) Non-sequential writing
B) Hypermedia
C) Blinking text
D) Text with heavy formatting
E) None of these




Q.4. If you wanted to locate the hardware address of a local device, which protocol would you use?

A) ARP
B) RARP
C) ICMP
D) PING
E) PONG




Q.5. Which of the following are normally used to initialize a computer system's hardware?

A) Bootstrap memory
B) Volatile memory
C) External mass memory
D) Static memory
E) Random access memory




Q.6. Programs that automatically submit your search request to several search engines simultaneously are called—

A) Metasearch engines
B) Webcrawlers
C) Spiders
D) Hits
E) None of these




Q.7. ……………. are used to identify a user who returns to a Website.

A) Cookies
B) Plug-ins
C) Scripts
D) ASPs
E) None of these




Q.8. All of the following are basic principles of networks, except—

A) Each computer must have a network card
B) There must be communications media connecting the network hardware devices
C) There must be at least one connecting device
D) Each computer must have software that supports the movement of information
E) None of these




Q.9. When you are selecting a mouse for a particular computer system, what is the most important consideration?

A) The type of drivers that come with the mouse
B) The length of the mouse cord
C) The type of connector the mouse is equipped with
D) The number of buttons the mouse has
E) Format




Q.10. RSA is—

A) Symmetric Cryptosystem
B) Asymmetric Cryptosystem
C) Block Cypher
D) Digital Signature
E) None of these




Q.11. Which is NOT a good Web security strategy?

A) Restrict access to the Web server; keep a minimum number of ports open
B) Limit the users who can load software, edit or add files.
C) Add demo programs, so users can test system without accessing production data.
D) Remove unnecessary compilers and interpreters.
E) None of the above




Q.12. All the information collected during database development is stored in a—

A) Repository
B) Data warehouse
C) RAD
D) CASE
E) None of these




Q.13. 'DOS' floppy disk does not have—

A) A Boot Record
B) A File Allocation Table
C) A Root Directory
D) Virtual Memory
E) BIOS




Q.14. Which of the following would most likely NOT be a symptom of a virus?

A) Existing program files and icons disappear
B) The CD-ROM stops functioning
C) The Web browser opens to an unusual home page
D) Odd messages or images are displayed on the screen
E) None of these




Q.15. Verification of a login name and password is known as:

A) Configuration
B) Accessibility
C) Authentication
D) Logging in
E) None of these





We have tried our best to present only  important computer awareness questions with correct answer key. Any suggestion or update about any erroneous entry or answer is always appreciable. Please comment your score or any suggestion in comment section below or you can write to us at careerguide.co@gmail.com. We will be glad to help you.

Want to Stay in Contact !

Get new posts and updates in your inbox. Subscribe through our Feedburner Email subscription.


Share With your Friends !


No comments:

Post a Comment