Académique Documents
Professionnel Documents
Culture Documents
1.Which Microsoft-based technology was built to link desktop applications to the World
Wide Web?
(A)Active Channel
(B)Active Desktop
(C)ActiveX
2.What is the name of the digital circuit that performs arithmetic and logical operations in
computers?
(A)Arithmetic Logic Unit
(B)Digital comparator
(C)Multiplexer
6.Which among the following key is used for checking grammar and spelling?
(A)F3
(B)F5
(C)F7
8.DDL is used to define the structure of a database, including the tables, columns, and
data types that it contains. Its full form is ?
(A)Data Definition Language.
(B)Data Definition Link
(C)Data Determination Language.
9.A DSLAM is a device used by Internet Service Providers (ISPs) to route incoming DSL
connections to the Internet. What is its correct full form ?
(A)Digital Subscriber Line Access Multiplexer
(B)Digital Subscriber Line Access Multiplier
(C)Digital Service Line Access Multiplexer
10.RUP Stands for "Rational Unified Process." RUP is a software development process
from Rational, a division of _______?
(A)Microsoft
(B)IBM
(C)Compaq
11.Which among the following defines web2.0 most precisely ?
(A)A New version of Internet
(B)A Series of technological improvements in World Wide Web
(C)A New labeling of old Softwares improved
13.32 bit operations were introduced for the first time by Microsoft in ________?
(A)windows 95
(B)Windows 3.0
(C)Windows 3.11
14.A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify
the location of a data object. What is correct full form?
(A)Graphical User Identifier
(B)Globally Unique Identifier
(C)Globally Unique Internet
15.Which among the following is responsible for allocating IP addresses and managing
the domain name system.?
(A)Domain name warehousing
(B)Internet Corporation For Assigned Names and Numbers
(C)Internet Assigned Numbers Authority
1.The performance of a hard drive or other storage device , meaning how long it takes to
locate a file is called ?
(A)Response Time
(B)Access Time
(C)Quick Time
4.A unit of data storage that equals 2 to the 70th power is called?
(A)Zebibyte
(B)Yottabite
(C)Yobibite
5.What is used in most programs that is a part of a program and guides the user through
certain steps?
(A)Software
(B)Wizard
(C)Wiki
6.A generic name for Intel processors released after the original 8086 processor is ______
?
(A)Pentium
(B)x86
(C)Pentium 286
7.A network that is connected to the Internet, but uses encryption to scramble all the data
sent through the Internet is called ?
(A)My network
(B)Virtual private Network
(C)Social Network
9.Panther (10.3), Jaguar (10.2), Puma (10.1), and Cheetah (10.0) are examples of
_______?
(A)Windows OS
(B)Mac OS
(C)Open Operating Systems
11.A file which has not been altered, compressed, or manipulated in any way by the
computer is called?
(A)temp file
(B)raw file
(C)permanent file
2.Any piece of data can be returned in a constant time, regardless of its physical location
and whether or not it is related to the previous piece of data using which of the
following ?
(A)CPU
(B)RAM
(C)ROM
(D)Network Interface Card
(E)None of the above
11.The sixth-generation era (sometimes referred to as the 128-bit era) refers to which of
the following?
(A)Sixth generation Computers
(B)Laptops
(C)Super computers
(D)Video game Consoles
(E)None of the above
12.BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the
following groups?
(A)ISDN
(B)IRC
(C)ISP
(D)Icons
(E)Host
Ans:- ISP all are internet service providers
17.In a computer file systems which among the following is top or first in hierarchy?
(A)root directory
(B)parent directory
(C)home directory
(D)working directory
(E)none of the above
5.Which among the following is the most common source of Viruses to the hard
disk of your computer?
(A)Incoming Email
(B)Outgoing Email
(C)CD Roms
(D)Websites
(E)Mobile
7.Which among the following is used for removing a software bug / defect which
is available for free of cost from the software provider?
(A)Version
(B)Update
(C)Help
(D)Patch
(E)Syntax
8.What is the name of the proposed software application that would allow users of
automated teller machines (ATMs) to alert the police of a forced cash withdrawal
by entering their personal identification number (PIN) in reverse order?
(A)ATM SafetyPIN
(B)ATM SafetyPro
(C)ATM SafetyCode
(D)ATM SafetySign
(E)ATM SafetyDigit
9.In the MICR Code Line Structure what do represent the first three digits of Sort
field number consisting of nine digits?
(A)City
(B)Bank
(C)Branch
(D)Account Type
(E)None of the above
Ans:- first three digits represent the city, the next three indicate the bank and the
last three digits signify the branch
10.Most of the internet banking sites provide which of the following feature to reduce the
risk of keystroke logging for the password entry?
(A)Virtual keyboard
(B)Finger Touching
(C)Touchscreen
(D)ShapeWriter
(E)Dasher
11.ADSL data communications technology uses which of the following for faster
data transmission ?
(A)Voiceband modem
(B)Wireless Modem
(C)Copper telephone Lines
(D)Sockets
(E)None of the above
13.While browsing the internet , which of the following key is used for full screen
view?
(A)F3
(B)F5
(C)F11
(D)F9
(E)F10
18.Which of the following company owns/ uses the Virtual Hard Disk (.vhd)
format for Virtual PC?
(A)IBM
(B)Microsoft
(C)Intel
(D)Google
(E)Apple
Ans:- Create More Free Space is the main purpose however performance is also
improved in most cases
Computer Awareness : Quiz 5 for Banking Examinations
1.In context with the Core Banking System, what does CORE stands for ________?
(A)Centralized Online Records Exchange
(B)Centralized Office Real-time Exchange
(C)Centralized Online Real-time Exchange
(D)Central Online Real-time Exchange
3.Which of the following term is used for the process of transforming information using
an algorithm to make it unreadable to anyone except those possessing special knowledge?
(A)deciphering
(B)encryption
(C)decryption
(D)coding
4.Which among the following is the correct definition of "Computer Audit" used many
times in Banking Industry?
(A)Practice of using computers to automate or simplify the audit process
(B)Practice of testing the computer security procedures and identification lapses
before the banking operation is put to risk
(C)software designed to read, process and write data with the help of functions
performing specific audit routines
(D)Practice of financial statement audit with the help of Computers
5.In which year was UNCITRAL Model Law on E-Commerce adopted by the United
Nations following which India passed the Information Technology Act 2000 in May
2000?
(A)1995
(B)1996
(C)1997
(D)1998
6.In 1995, the Reserve Bank had set up the Committee for Proposing Legislation on
Electronic Funds Transfer and other Electronic Payments. What this committee was
called?
(A)Rangrajan Committee
(B)Shere Committee
(C)Saraf Committee
(D)Narsimham Committee
7.In context with the use of Information technology in Banks, what is the meaning of
Cheque Truncating?
(A)illegal act of taking advantage of the float to make use of non-existent funds in a
cheque
(B)creating digital version of the original cheque
(C)crossing of cheque
(D)None of Them
9.While browsing internet , a keyboard shortcut is used to place a www to the beginning
and ".com" to the end of the text typed in the Address bar. Which among the following
shortcuts?
(A)ALT + ENTER
(B)CNTRL + ENTER
(C)ALT + SHIFT
(D)CNTRL + SHIFT
11.Access control which enables an authority to control access to areas and resources in a
given physical facility or computer-based information system has two important
processes. These processes are ___?
(A)Encryption & Decryption
(B)Locking and Unlocking
(C)Authorization and authentication
(D)Tunneling and Switching
12.Most of the ATM cards, credit cards, debit cards, etc all over the world are of ISO/IEC
7810 ID-1 size, an international standard format that defines the physical characteristics
for identity or identification cards. What are the approx. dimensions of these cards?
(A)93 x 53 mm
(B)90 x 49 mm
(C)86 × 54 mm
(D)74 x 44 mm
Ans:- 86 × 54 mm, This is defined by ISO as 85.60 × 53.98 mm in size
13.The first 6 digits of the credit card number are known as ___?
(A)Issuer Identification Number
(B)Major Industry Identifier
(C)account number
(D)Check sum