South Indian Bank PO - SPLessons

SIB PO Computer Aptitude

Home > > Tutorial
SPLessons 5 Steps, 3 Clicks
5 Steps - 3 Clicks

SIB PO Computer Aptitude

shape Introduction

SIB PO Stage – 1 Online Examination, conducted in online Mode, has: a duration of 2 hours 20 minutes, a total of 160 questions, a maximum score of 200 marks, and consists of 4 sections, namely – Reasoning & Computer Aptitude, English Language, General/ Economy/ Banking Awareness, Data Analysis & Interpretation. There is a Negative marking in SIB PO Stage – 1 Online exam and [latex]{(\frac {1}{4})}^{th}[/latex] marks are deducted for each wrong answer. Candidates must clear the cut-off in all the sections to qualify for the NABARD Grade B Main exam.
The article SIB PO Computer Aptitude provides complete details of Computer Aptitude syllabus and provides study guide with answers. By solving this questions candidates can improve and maintain, speed, and accuracy in the exams.

shape Pattern

The SIB PO 2019 Stage - 1 Online Test consists of four different sections containing different marks with a total of 200 marks .
Sr. No Name of Tests No. of Qs. Max. Marks Version Time allotted for each test (Separately timed)
1. Reasoning & Computer Aptitude 40 50 Only English 40 minutes
2. General/ Economy/ Banking Awareness 40 50 20 minutes
3. English Language 40 50 40 minutes
4. Data Analysis & Interpretation 40 50 40 minutes
Total 160 200 140 minutes

SIB PO Exam Syllabus- Computer Aptitude 20 Marks
  • History and Evolution of Computers – Generations of Computers
  • Computer Fundamentals
  • Operating Systems
  • Input and Output Devices (I/O Devices)
  • Central Processing Unit (CPU)
  • Storages and Memories
  • Database Management
  • Basic Security Concepts
  • Internet
  • Email
  • Computer Abbreviations
  • Microsoft Office (Word, Excel, PowerPoint, etc.)
  • Keyboard Shortcuts
  • Computer Terminologies


  • shape Samples

    1. Which of the following topologies has the highest reliability?
    A. Star topology B. Bus topology C. Ring topology D. Mesh topology E. None of these
    Answer - Option D
    Explanation:
    In the mesh topology, each computer is connected to the other with a separate physical link in a network. It is most reliable topology as the network does not get down in case one of the nodes is failed.
    2. Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups?
    A. program thievery B. data snatching C. software piracy D. program looting E. data looting
    Answer - Option C
    Explanation:
    Software piracy is the illegal copying, distribution, or use of software.
    3. EDBIC code can support how many different representation of characters?
    A. 256 B. 149 C. 1024 D. 64 E. 16
    Answer - Option A
    Explanation:
    EBCDIC stands for Extended Binary Coded Decimal Interchange Code. EBCDIC is a 8-Bit code with 256 different representations of characters. It is mainly used in mainframe computers.
    4. The main webpage of a website is also known as ­
    A. Contents Page B. Home Page C. Introduction Page D. First Page E. Icebreaker Page
    Answer - Option B
    Explanation:
    A home page is the main page or the introductory page of a website, typically serving as a table of contents for the site.
    5. What is a hyperlink?
    A. It is a text or image that you can click on to jump to a new document/page. B. It is an input type for multimedia files. C. It is a collection or directory of web pages. D. It is the home page of a site. E. None of the above
    Answer - Option A
    Explanation:
    A hyperlink, or simply a link, is a reference to data that the reader can directly follow either by clicking, tapping, or hovering. Hyperlinks are found in nearly all Web pages, allowing users to click their way from page to page.
    6. What is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host?
    A. Identity Theft B. Forging C. IP Spoofing D. Pharming E. Phishing
    Answer - Option C
    Explanation:
    Spoofing: It is a type of scam where an intruder attempts to gain unauthorized access to a user's system or information by pretending to be the user. The main purpose is to trick the user into releasing sensitive information.
    7. Portrait and Landscape are:
    A. Page Orientation B. page layout C. page size D. page view E. none of the above
    Answer - Option A
    Explanation:
    Page orientation is the way in which a rectangular page is oriented for normal viewing.
    8. Internet access by transmitting digital data over the wires of a local telephone network is provided by:
    A. leased line B. digital subscriber line C. digital signal line D. MODEM E. None of the above
    Answer - Option B
    Explanation:
    Digital subscriber line (DSL or digital subscriber loop) is a family of technologies that are used to transmit digital data over telephone lines.
    9. Which of the following network devices is also called a concentrator?
    A. Switch B. Router C. Brouter D. Repeater E. Hub
    Answer - Option E
    Explanation:
    A hub contains several ports for connecting multiple computers to form a small network. A simple hub is also called a concentrator.
    10. What type of web technology creates an online community where people can make statements and others can read and respond to those statements?
    A. I-Journal B. Podcast C. ASP D. Blog E. None of the above
    Answer - Option D
    Explanation:
    A blog is a regularly updated website or web page, typically one run by an individual or small group, that is written in an informal or conversational style.

    SIB PO SIB PO Computer Aptitude – Study GuideClick Here

    SIB PO 2019 - Related Information
    SIB PO Reasoning Ability – Study Guide
    SIB PO English Language – Study Guide
    SIB PO Data Analysis & Interpretation – Study Guide
    SIB PO General/ Economy/ Banking Awareness – Study Guide