Tuesday, April 1, 2014

SBI SO questions and solutions


Here is SBI SO previous paper with solution. Here answers are curated with at most attention. But there are chances for errors. Those doubtful questions are marked red. If there is any error please mention in comment form. Best wishes

  1. To create a copy files in the event of system failure, you create a ___
    1. Firewall
    2. Redundancy
    3. Backup
    4. Restore file
    5. None of these
  2. Print server uses___ which is a buffler that holds before it is send to the printer.
    1. Queue
    2. Spool
    3. Node
    4. Stack
    5. None of these
  3. Which of the following identifies specific web page and its computer on the web page?
    1. Web site
    2. URL
    3. Web site address
    4. Domain Name
    5. None of these
  4. _____ is the computer to computer exchange of routine business data between trading partners in standard data formats.
    1. CTS
    2. DSR
    3. VDR
    4. EDI (Electronic data interchange)
    5. None of these
  5. Communication handler is basically an ____ 16 bit micro controller?
    1. 8085
    2. 8086
    3. 8086A
    4. 80C186
    5. None of these
  6. Which uses a Pre-Shared Key that is more than 7 and less than 64 characters in length?
    1. WPA-PSK
    2. TKIP
    3. AES
    4. All of these
    5. None of these
  7. Ping command is used for what purpose?
    1. Test a device on a network whether it is reachable
    2. Test a hard disk fault
    3. Test a bug in the application
    4. Test devices scanning quality
    5. None of these
  8. Two different kind of networks can be connected by using—
    1. Bridges
    2. Satellite
    3. Gateway
    4. Routers
    5. None of these
  9. Full adder is used to—
    1. 2 bit addition
    2. 3 bit addition (Two input and one carry)
    3. 4 bit addition
    4. 6 bit addition
    5. None of these
  10. Most important advantage of an IC is its—
    1. Easy replacement in case of circuit failure
    2. Low power consumption
    3. Extremely high reliability
    4. Reduced cost
    5. None of these
  11. An 1C contains 50 gates each of which consists of 6 components. Its belongs to
    1. VLSI
    2. LSI
    3. MS1
    4. SSI
    5. None of these
  12. Which type of computers use the 8 bit code called EBCDIC?(Extended Binary Coded Decimal Interchange Code)
    1. Minicomputers
    2. Mainframe computers
    3. Super computer
    4. Microcomputer
    5. None of these
  13. An AND gate
    1. Implements logic addition
    2. Is equivalent to a series switching circuit
    3. Is any-or all gate
    4. Is equivalent to a parallel switching circuit
    5. None of these
  14. The decimal equivalent of the binary number 11100001111 is
    1. 1806
    2. 1807
    3. 2806
    4. All of these
    5. None of these
  15. Programs in which of the following memories can’t be erased ?
    1. RAM
    2. ROM
    3. Cache Memory
    4. Virtual Memory
    5. None of these
  16. The IP address 135.0.10.27 belongs to address class?
    1. A
    2. B
    3. C
    4. D
    5. None of these
  17. Which are not used in case of applet?
    1. Read /write
    2. Internet
    3. Search engine
    4. All of these
    5. None of these
  18. Which of the following is not a type of database?
    1. Hierarchical
    2. Relational
    3. Network
    4. Transition
    5. None of these
  19. Which of the following is not a type of SQL statement?
    1. Data Manipulation Language
    2. Data Definition language
    3. Data control language
    4. Data Standard language
    5. None of these
  20. In Queue , the items deleted at one end is called
    1. Rear
    2. Front
    3. Top
    4. Base
    5. None of these
  21. The drawback of the binary tree sort are remedied by the
    1. Linear sort
    2. Heap Sort
    3. Insertion sort
    4. Quick Sort
    5. None of these
  22. White Box testing, a software testing technique is sometimes called
    1. Graph testing
    2. Basis path
    3. Glass box testing
    4. Data flow testing
    5. Loop testing
  23. Which of the following is used with database?
    1. EDI
    2. Credit card
    3. ATM
    4. Payment gateway
    5. Data mining
  24. When a cracker attempts to misuse or steal data from a system, it is called
    1. Stealing
    2. Intrusion
    3. Virus
    4. Worm
    5. None of these
  25. To modify existing rows of the table ____ statement is used.
    1. ALTER
    2. MODIFY
    3. UPDATE
    4. COMMIT
    5. DELETE
  1. ____ refers to a family of IEEE standards dealing with local area network and metropolitan area network.
    1. 802
    2. 800
    3. 801
    4. 803
    5. None of these
  2. Which is the general network standard for the data link layer in the OSI Reference Model?
    1. IEEE 802.1
    2. IEEE 802.2
    3. IEEE 802.3
    4. IEEE 802.4
    5. IEEE 802.6
  3. ____ uses a standard called IEEE 802.6.
    1. LAN
    2. WAN
    3. MAN
    4. Internet
    5. None of these
  4. Repeater operates in which layer of OSI model?
    1. Application layer
    2. Presentation layer
    3. Physical layer
    4. Transport layer
    5. Data link layer
  5. Where does Bridge operate in OSI model?
    1. Physical layer
    2. Data link layer
    3. Both (1)and (2)
    4. Application layer
    5. None of these
  6. Which of the following uses the greatest number of layers in the OSI model?
    1. Bridge
    2. Repeater
    3. Router
    4. Gateway
    5. None of these
  7. Routers operate in which layer of the OSI model?
    1. Physical layer
    2. Data link layer
    3. Network Layer
    4. All of these
    5. None of these
  8. Modem is a _____ that modulates and demodulate signals
    1. DCE (Data circuit-terminating equipment)
    2. DTE (Data terminal equipment)
    3. DTE-DCE
    4. Both (1)and (2)
    5. None of these
  9. A communication network which is used by large organizations over regional, national or global area is called ___
    1. LAN
    2. WAN
    3. MAN
    4. Internet
    5. None of these
  10. At ___ layer, TCP/IP defines two protocols :Transmission Control Protocol (TCP) and User Datagram Protocol(UDP).
    1. Transport layer
    2. Network layer
    3. Physical layer
    4. Application layer
    5. None of these
  11. The ___ layer is the layer closest to transmission medium.
    1. Transport
    2. Network
    3. Data link
    4. Physical
    5. None of the above
  12. End to end connectivity is provided from host to host in :
    1. Network layer
    2. Session layer
    3. Data link layer
    4. Transport layer
    5. None of these
  13. Which of the following TCP/ IP protocol is used for transferring electronic mail messages from one machine to another?
    1. SNMP
    2. SMTP
    3. RPC
    4. FTP
    5. None of these
  14. Which of the following is an example of a client-server model?
    1. FTP
    2. DNS
    3. TELNET
    4. All of these
    5. None of these
  15. Which IEEE Standards is usz for Wi/Fi systems?
    1. 802.11
    2. 802.1
    3. 802.2
    4. 802.3
    5. 802.10
  16. _____ is the continuous ability to send and receive data between interconnected networks.
    1. FTP
    2. SMTP
    3. TNS(Transparent Network Substrate)
    4. Network Interoperability
    5. None of these
  17. TNS is a proprietary network technology by oracle that works above TCP/IP that support peer to peer connectivity
  18. What is the default subnet mask for a class B network?
    1. 127.0.0.1
    2. 2550.0.0
    3. 255.255.0.0
    4. 255.255.255.0
    5. None of these
  19. What is loopback address?
    1. 127.0.0.1
    2. 255.0.0.0
    3. 255.255.0.0
    4. 127.0.0.0
    5. None of these
  20. Internet-like networks within enterprises.
    1. Intranets
    2. Switching alternating
    3. Inter organizational networks
    4. Extranets
    5. None of these 
  21. (Extranet is a computer network that provide controlled access from outside especially for business and medical purposes)
  22. A central computer surrounded by one or more satellite computers is called a
    1. Bus network
    2. Ring network
    3. Star network
    4. All of the above
    5. None of these
  23. With an IP address of 100,you currently have 80 subnets.What subnet mask should you use to maximize the number of available hosts?
    1. 192
    2. 240
    3. 248
    4. 224
    5. 252
  24. (Question not clear - what does it mean by an IP address of 100?? If you have any idea please write on the comment box)
  25. Encryption/decryption provides a network with____
    1. Privacy
    2. Authenticity
    3. Integrity
    4. Non-reputation
    5. None of these
  26. The data to be encrypted at the sender site is called ___.The data to be decrypted at receiver end is called ____
    1. Secret key, public key
    2. Public key, secret key
    3. Plaintext, ciphertext
    4. Ciphertext, plaintext
    5. None of these
  27. In digital signature the private key is used for ___ and the public key for ____
    1. Encryption, decryption
    2. Decryption, encryption
    3. Plaintext, ciphertext
    4. Ciphertext, plaintext
    5. None of these
  28. A ___ ‘s main purpose is to prohibit unauthorized access to your computer via the Internet.
    1. Popup blocker
    2. Firewall
    3. Spyware
    4. Spam assassin
    5. None of these

11 Comments:

At April 2, 2014 at 8:12 AM , Anonymous Rekha said...

Thanks for the paper and solutions

 
At April 4, 2014 at 2:22 AM , Blogger Unknown said...

Q.23)--->DATA MINING

 
At April 4, 2014 at 2:26 AM , Blogger Unknown said...

Q.46)--->252

 
At January 16, 2015 at 12:49 AM , Blogger Unknown said...

Q3,Q6,Q10

 
At October 1, 2015 at 8:10 AM , Anonymous iDeals said...

Thanks for SBI SO paper with solutions. Answers are curated with at most attention.

 
At December 3, 2015 at 6:27 AM , Blogger Unknown said...

can fresher apply for specialist officers

 
At January 3, 2016 at 4:59 AM , Blogger arya said...

There are so many wrong answers marked in this blog.
For example :Q30 )Bridges operate in Data link layer only.
Verify it here :
http://www.allinterview.com/showanswers/12051/bridges-work-at-layer-osi-model-data-link-b-network-c-physical-d-application.html

 
At January 3, 2016 at 5:14 AM , Blogger arya said...

For
Q10) answer is 3 Extremely high reliablitiy.
Q11) answer is 3 MSI not (MS1)
Q47) answer is A Privacy

 
At July 6, 2016 at 8:56 PM , Blogger AmitR said...

que 32, Routers work in Network layer. All the three layers as answer is wrong.

 
At December 2, 2016 at 10:41 PM , Blogger Unknown said...

Thanks

 
At January 10, 2021 at 12:25 AM , Blogger mt said...

This comment has been removed by the author.

 

Post a Comment

Subscribe to Post Comments [Atom]

<< Home