computer questions for the upcoming sbi clerk exam 2014 - cai
DESCRIPTION
noneTRANSCRIPT
7/18/2014 Computer Questions for the upcoming SBI Clerk Exam 2014 - CAI
http://crackaninterview.com/computer-questions-upcoming-sbi-po-exam-2014/ 1/14
Computer Questions for the upcoming
SBI Clerk Exam 2014
Home / Uncategorized / Computer Questions for the
upcoming SBI Clerk Exam 2014
admin | July 3, 2014 | Uncategorized | No
Comments
Sharing some important computer questions for the
upcoming SBI Clerk exams 2014 with the readers of
crackaninterview.com. The correct answers have been
darkened. Please feel free to ask if you have any doubt. We
will be back with some more General awareness questions
very soon.
JOIN US NOW
Your email Address... Subscribe
Get updates on your Email
JOIN THE CONVERSATIONNOW
INTERVIEW TIPS INTERVIEW QUESTIONS CAREER TIPS JOB HUNTING
ENTREPRENEURSHIP EXAM RESULT ADMIT CARD EXAM QUESTIONS
7/18/2014 Computer Questions for the upcoming SBI Clerk Exam 2014 - CAI
http://crackaninterview.com/computer-questions-upcoming-sbi-po-exam-2014/ 2/14
Important Computer Questions for
upcoming SBI PO Exams 2014
Which of the fol lowing organizations have not been
computerized?
1. Banks
2. Railways
3. Water Supply
4. Airways
A bit is
1. ‘O’ or ’1′
2. 0 and 1
3. Neither 0 nor 1
4. None of these
A bit can store
7/18/2014 Computer Questions for the upcoming SBI Clerk Exam 2014 - CAI
http://crackaninterview.com/computer-questions-upcoming-sbi-po-exam-2014/ 3/14
1. Only 1 digit
2. Digits- 0 and 1
3. Any digit
4. None of these
Which of the fol lowing is not a binary system
1. EBCDIC
2. ASCH
3. HEX
4. None of these
Complement of 1010 is
1. 0000
2. 1011
3. 0101
4. None of these
Which of the fol lowing user identification and
authentication technique is least secure?
1. IMCR
2. SMART TOKENS
3. User Id ’s and Passwords
7/18/2014 Computer Questions for the upcoming SBI Clerk Exam 2014 - CAI
http://crackaninterview.com/computer-questions-upcoming-sbi-po-exam-2014/ 4/14
4. All of the above
User authentication technique that uses reference
profi le is
1. Fingerprint recognition
2. Memory tokens
3. Smart tokens
4. All of the above
Physical access to a data centre can be checked by:
1. Piggybacking
2. Locks and keys
3. Fire suppression system
4. All of the above
A clerk in bank has to access data on computer
account. Logical access control for these users would
be
7/18/2014 Computer Questions for the upcoming SBI Clerk Exam 2014 - CAI
http://crackaninterview.com/computer-questions-upcoming-sbi-po-exam-2014/ 5/14
1. Use of an accounts receivable section password
2. Use of individual password
3. Use of individual password plus separate access passwords
for customer data and product data.
4. None of these
Logical access security could be compromised by
various elements of a computer system. Which one of
the fol lowing could make a system insecure.
1. Smart Cards with PIN
2. Non- Reusable Password
3. Last login messages
4. Network Cabl ing
What is a distributed database supports multi user
access
1. Distribution design
7/18/2014 Computer Questions for the upcoming SBI Clerk Exam 2014 - CAI
http://crackaninterview.com/computer-questions-upcoming-sbi-po-exam-2014/ 6/14
2. Concurrency control
3. Replication
4. Redundancy
Fifth generation computers are:
1. Data processors
2. Knowledge processors
3. Data interpreters
4. Encryptions
The first generation of Computers was
1. Electrical
2. Mechanical
3. Electronic
4. None of these
Mark 1 computers was
1. Electrical machine
2. Mechanical machine
3. Electronic machine
7/18/2014 Computer Questions for the upcoming SBI Clerk Exam 2014 - CAI
http://crackaninterview.com/computer-questions-upcoming-sbi-po-exam-2014/ 7/14
4. None of these
A group of same data types stored together in memory
forms
1. An array
2. An object
3. A structure
4. None of these
Which of the fol lowing can’t be a part of the email
address?
1. Period (.)
2. At sign (@)
3. Underscore (_)
4. None of these
Which of the fol lowing is a point and draw device.
1. Mouse
2. Printer
3. Scanner
4. CD-Rom
5. Cleaner
7/18/2014 Computer Questions for the upcoming SBI Clerk Exam 2014 - CAI
http://crackaninterview.com/computer-questions-upcoming-sbi-po-exam-2014/ 8/14
Which of these is a form of denial of service attack in
which a hosti le cl ient repeatedly sends SYS packets to
every port on the server using fake IP address?
Cybergaming crime
Memory shaving
Syn Flooding
Software Piracy
None of these
A device for changing the connection in a connector to
a different configuration is
1. A convertor
2. A component
3. An attachment
4. An adapter
5. A voltmeter
A mistake in an algorithm that causes incorrect results
is cal led a
1. Logical Error
2. Syntax error
3. Procedural error