Bank PO Computer Awareness(01-97)
1. Which among the following is responsible for allocating IP addresses and
managing the domain name system.?
[A]Domain name warehousing
[B]Internet Corporation For Assigned Names and Numbers
[C]Internet Assigned Numbers Authority
[D]None of these
[A]Response Time
[B]Access Time
[C]Quick Time
[D]None of these
[A]Check Box
[B]Combo Box
[C]Dialog Box
[D]None of these
[A]Machine Language
[B]High Language
[C]Assembly Language
[D]None of these
[A]Zebibyte
[B]Yottabite
[C]Yobibite
[D]None of these
[A]Software
[B]Wizard
[C]Wiki
[D]None of these
[A]Pentium
[B]x86
[C]Pentium 286
[D]None of these
[A]My network
[B]Virtual private Network
[C]Social Network
[D]None of these
[A]Video & Graphics
[B]Text & Images
[C]programs
[D]None of these
[A]Windows
OS
[B]Mac OS
[C]Open Operating Systems
[D]None of these
11. Structured Query Language (SQL) is used in the following ?
[A]Create Databases
[B]Create & Modify Databases
[C]Create, Modify & Query Databases
[D]None of these
[A]temp file
[B]raw file
[C]permanent file
[D]None of these
[A]width of the data cable
[B]amount of data transferred
[C]number of the computers on a particular network
[D]None of these
[A]Dell
[B]IBM
[C]Compaq
[D]None of these
[A]Magnetic Stripe Card
[B]Smart Card
[C]Fleet Card
[D]All of them are payment card technologies
[A]]Debit Card
[B]Smart Card
[C]Credit Card
[D]None of these
[A]Object code
[B]Source Code
[C]Machine Language
[D]Assembly Language
[A]CPU
[B]RAM
[C]ROM
[D]Network Interface Card
[A]Active Channel
[B]Active Desktop
[C]ActiveX
[D]None of these
[A]Arithmetic Logic Unit
[B]Digital comparator
[C]Multiplexer
[D]None of these
21. What is the full form of ADSL ?
[A]Automatic Digital Subscriber Line
[B]Asymmetric Direct Subscriber Line
[C]Asymmetric Digital Subscriber Line
[D]None of these
[A]F3
[B]F5
[C]F7
[D]None of these
[A]command
[B]software
[C]program
[D]None of these
[A]Data Definition Language.
[B]Data Definition Link
[C]Determination Language.
[D]None of these
[A]Digital Subscriber Line Access
Multiplexer
[B]Digital Subscriber Line Access Multiplier
[C]Digital Service Line Access Multiplexer
[D]None of these
[A]Microsoft
[B]IBM
[C]Compaq
[D]None of these
[A]A New version of Internet
[B]A Series of technological improvements in World Wide Web
[C]A New labeling of old Softwares improved
[D]None of these
[A]1977
[B]1985
[C]1988
[D]None of these
[A]windows
95
[B]Windows 3.0
[C]Windows 3.11
[D]None of these
[A]Graphical User
Identifier
[B]Globally Unique Identifier
[C]Globally Unique Internet
[D]None of these
31. Which among the following are not Objects in Access
Database?
[A]Table
[B]Form
[C]Query
[D]Pivot Table
[A]turn key
[B]alt key
[C]del key
[D]shift key
[A]analog computer
[B]digital computer
[C]both analog and digital computer
[D]mainframe computer
[A]First Generation Computers
[B]Second Generation Computers
[C]Third Generation Computers
[D]Fourth Generation Computers
[A]Machine
Language was developed prior to Assembly Language
[B]Assembly Language Was developed prior to Machine Language
[C]Both Assembly and machine languages were developed together
[D]First generation computers used machine language and second generation computers used assembly language
36. Which of the following are called Knowledge Information processing System?
[A]Fourth Generation Computers
[B]Fifth Generation Computers
[C]Laptops
[D]Servers
[A]Very Large Scale Integration
[B]Very large Software Integration
[C]Very large Scale Implementation
[D]Very Large Software Implementation
[A]First
[B]Second
[C]Third
[D]Fifth
[A]Sixth generation Computers
[B]Laptops
[C]Super computers
[D]Video game Consoles
[A]ISDN
[B]IRC
[C]ISP
[D]Icons
81. Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?
[A]Downtime
[B]Uptime
[C]Response time
[D]Runtime
[A]100
[B]108
[C]125
[D]140
[A]Foreground processing.
[B]Background processing.
[C]Black processing.
[D]White processing.
[A]To Convert graphic and pictorial data into binary inputs
[B]To convert graphic and pictorial data into analog inputs
[C]Debugging
[D]None of the above Uses
[A]Direct Access Storage Device
[B]Secondary Storage Device
[C]Primary Storage Device
[D]Gateway Device
[A]Algorithm
[B]Flowchart
[C]Block diagram
[D]]Loop
[A]Bandwidth
[B]Channel Capacity
[C]Frequency Modulation
[D]Amplitude distortion
[A]Backend processor
[B]Front-end processor
[C]Node processor
[D]File Server
1. Payments to third parties, including bill payments and telegraphic/wire transfers
2. Funds transfers between a customer's own transactional account and savings accounts
3. Investment purchase or sale
4. Loan applications and transactions, such as repayments of enrollments Choose correct option:
[A]1, 2 & 3
[B]2, 3 & 4
[C]1, 3 & 4
[D]1, 2 , 3 & 4
[A]2 G
[B]3 G
[C]4 G
[D]5G
[B]Internet Corporation For Assigned Names and Numbers
[C]Internet Assigned Numbers Authority
[D]None of these
2. The performance of a hard
drive or other storage device , meaning how long it takes to locate a file is
called ?
[B]Access Time
[C]Quick Time
[D]None of these
3. Alerts are mostly appear in
______?
[B]Combo Box
[C]Dialog Box
[D]None of these
4. Which of the following was
used in first generation computers?
[B]High Language
[C]Assembly Language
[D]None of these
5. A unit of data storage that
equals 2 to the 70th power is
called?
[B]Yottabite
[C]Yobibite
[D]None of these
6. What is used in most
programs that is a part of a program and guides the user through certain
steps?
[B]Wizard
[C]Wiki
[D]None of these
7. A generic name for Intel
processors released after the original 8086 processor is ______
?
[B]x86
[C]Pentium 286
[D]None of these
8. A network that is connected
to the Internet, but uses encryption to scramble all the data sent through the
Internet is called ?
[B]Virtual private Network
[C]Social Network
[D]None of these
9. V-RAM is used for access of
the following ?
[B]Text & Images
[C]programs
[D]None of these
10. Panther (10.3), Jaguar
(10.2), Puma (10.1), and Cheetah (10.0) are examples of _______?
[B]Mac OS
[C]Open Operating Systems
[D]None of these
[A]Create Databases
[B]Create & Modify Databases
[C]Create, Modify & Query Databases
[D]None of these
12. A file which has not been
altered, compressed, or manipulated in any way by the computer is
called?
[B]raw file
[C]permanent file
[D]None of these
13. The word bandwidth is also
used to mean ________?
[B]amount of data transferred
[C]number of the computers on a particular network
[D]None of these
14. NetBIOS was introduced in
1983 by which company as an improvement to the standard BIOS used by
Windows-based computers?
[B]IBM
[C]Compaq
[D]None of these
15. Which among the following
is not a payment card technology?
[B]Smart Card
[C]Fleet Card
[D]All of them are payment card technologies
16. Which among the following
can be called an electronic check ?
[B]Smart Card
[C]Credit Card
[D]None of these
17. Which of the following was
used in programming the first computers?
[B]Source Code
[C]Machine Language
[D]Assembly Language
18. Any piece of data can be
returned in a constant time, regardless of its physical location and whether or
not it is related to the previous piece of data using which of the following
?
[B]RAM
[C]ROM
[D]Network Interface Card
19. Which Microsoft-based
technology was built to link desktop applications to the World Wide
Web?
[B]Active Desktop
[C]ActiveX
[D]None of these
20. What is the name of the
digital circuit that performs arithmetic and logical operations in
computers?
[B]Digital comparator
[C]Multiplexer
[D]None of these
[A]Automatic Digital Subscriber Line
[B]Asymmetric Direct Subscriber Line
[C]Asymmetric Digital Subscriber Line
[D]None of these
22. Which among the following
key is used for checking grammar and
spelling?
[B]F5
[C]F7
[D]None of these
23. An Autoresponder is
a_______on mail server that automatically replies to e-mails
?
[B]software
[C]program
[D]None of these
24. DDL is used to define the
structure of a database, including the tables, columns, and data types that it
contains. Its full form is ?
[B]Data Definition Link
[C]Determination Language.
[D]None of these
25. A DSLAM is a device used by
Internet Service Providers (ISPs) to route incoming DSL connections to the
Internet. What is its correct full form ?
[B]Digital Subscriber Line Access Multiplier
[C]Digital Service Line Access Multiplexer
[D]None of these
26. RUP Stands for "Rational
Unified Process." RUP is a software development process from Rational, a
division of _______?
[B]IBM
[C]Compaq
[D]None of these
27. Which among the following
defines web2.0 most precisely ?
[B]A Series of technological improvements in World Wide Web
[C]A New labeling of old Softwares improved
[D]None of these
28. Microsoft first introduced
an operating environment named Windows in which
year?
[B]1985
[C]1988
[D]None of these
29. 32 bit operations were
introduced for the first time by Microsoft in ________?
[B]Windows 3.0
[C]Windows 3.11
[D]None of these
30. A GUID is a 128-bit (16
byte) number used by software programs to uniquely identify the location of a
data object. What is correct full form?
[B]Globally Unique Identifier
[C]Globally Unique Internet
[D]None of these
[A]Table
[B]Form
[C]Query
[D]Pivot Table
32. Which of the following Key
is not found in normal computers / laptops?
[B]alt key
[C]del key
[D]shift key
33. A hybrid computer exhibits
the features of ______?
[B]digital computer
[C]both analog and digital computer
[D]mainframe computer
34. Structured programming
languages such as C, COBOL and FORTRAN were used in which of the following
computers?
[B]Second Generation Computers
[C]Third Generation Computers
[D]Fourth Generation Computers
35. Which among the following
statement is correct ? (More than one options are correct )
[B]Assembly Language Was developed prior to Machine Language
[C]Both Assembly and machine languages were developed together
[D]First generation computers used machine language and second generation computers used assembly language
A & D are correct
36. Which of the following are called Knowledge Information processing System?
[A]Fourth Generation Computers
[B]Fifth Generation Computers
[C]Laptops
[D]Servers
37. What is the correct full
form of VLSI?
[B]Very large Software Integration
[C]Very large Scale Implementation
[D]Very Large Software Implementation
38. Which of the following
generation of computers is associated with artificial
intelligence?
[B]Second
[C]Third
[D]Fifth
39. The sixth-generation era
(sometimes referred to as the 128-bit era) refers to which of the
following?
[B]Laptops
[C]Super computers
[D]Video game Consoles
40. BSNL, Reliance, Shaw cable,
AOL, Tata Indicom all can be kept in which one of the following
groups?
[B]IRC
[C]ISP
[D]Icons
ISP all are internet service providers
41. One kilobyte has _____?
[A]1000 bytes
[B]128 bytes
[C]1024 bytes
[D]1036 bytes
[A]A computer brand
[B]A software brand
[C]A software program
[D]A programming language
43. First microprocessors were used in which of the following?
[A]Computers
[B]Calculators
[C]Telephones
[D]Printers
[A]Peripherals
[B]RAM
[C]ROM
[D]CPU
[A]root directory
[B]parent directory
[C]home directory
[D]working directory
[A]An error message indicating server not found
[B]An error message indicating moved permanently
[C]An error message indicating forbidden
[D]An error message indicating server found
[A]recording of transactions
[B] passbook maintenance
[C]interest calculations
[D]All of the above
[A]Spam
[B]Hacking
[C]Virus
[D]Phishing
[A]Social networking sites
[B]Mobile Phones
[C]E-mails
[D]Cyber cafés
[A]spam
[B]hacking
[C]Phishing
[D]Vishing
[A]Hardware
[B]Software
[C]Firmware
[D]Malware
[A]Cascading Style Software
[B]Clear Style Sheet
[C]Cascading Style Sheet
[D]Common Style Sheet
[A]Reduce Power consumption
[B]Back Up
[C]To write contents of RAM to hard disc
[D]To improve download speed
[A]RAM
[B]Hard Disc
[C]Magnetic Tape
[D]Floppy Disc
[A]IBM
[B]Microsoft
[C]Intel
[D]Google
[A]A file format
[B]A software
[C]A electronic device
[D]An international standard
[A]Make the PC faster
[B]Make the PC fastere
[C]Delete temporary files
[D]Reduce Power consumption
68. Which among the following is a device , that is used in computers to add external components?
[A]Storage Device such as USB
[B]Keyboard
[C]Ports / System Boards
[D]RAM
[A]Access time
[B]Response time
[C]Entrance time
[D]Ping Time
[A]Approaching the nearest Bank Branch
[B]SMS on Mobile
[C]E-mail by applying for OTP online
[D]All of above
[A]Rural Banking
[B]Unit Banking
[C]Online Banking
[D]Mobile Banking
72. Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip At which among the above locations CVV or Card Security Code of an ATM is found?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3
[A]Segmentation
[B]Documentation
[C]Data Management
[D]Data History
[A]A person paying a restaurant bill by giving details of his credit card
[B]A person making an online purchase using his / her credit card
[C]A person making a purchase using mobile banking
[D]Both 2 & 3
[A]Only 1
[B]1 & 2
[C]1, 2 & 3
[D]None of them
[A]It is used to inject worms or viruses in the system
[B]It is used to determine a password
[C]It is used to access customer's account by determining other details
[D]It is used for stealing info from the Credit Card
1. Software
2. Hardware
3. Internet Programmes The terms Bug and Debugging are generally used in which among the above?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3
[A]RTGS Transfers
[B]NEFT Transfers
[C]SWIFT Transfers
[D]All of them
79. The Clearing House Interbank Payments System or CHIPS is a clearing system for large value transactions in which among the following countries / regions?
[A]United States
[B]United Kingdom
[C]Entire Europe
[D]Australia
[A]Bit Rate
[B]Response Time
[C]Command Line Interface
[D]Random memory
[B]128 bytes
[C]1024 bytes
[D]1036 bytes
42. Which among the following is correct about 4GL?
[B]A software brand
[C]A software program
[D]A programming language
A programming language, 4GL means fourth-generation programming language
43. First microprocessors were used in which of the following?
[A]Computers
[B]Calculators
[C]Telephones
[D]Printers
44. Which of the following transforms input data into output data?
[B]RAM
[C]ROM
[D]CPU
45. In a computer file systems which among the following is top or first in hierarchy?
[B]parent directory
[C]home directory
[D]working directory
46. What is HTTP 404?
[B]An error message indicating moved permanently
[C]An error message indicating forbidden
[D]An error message indicating server found
47. Core Banking Solutions are developed to perform__?
[B] passbook maintenance
[C]interest calculations
[D]All of the above
48. Which among the following is not a security / privacy risk?
[B]Hacking
[C]Virus
[D]Phishing
49. Now a days Vishing has become a criminal practice of using social engineering over which of the following?
[B]Mobile Phones
[C]E-mails
[D]Cyber cafés
50. When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?
[B]hacking
[C]Phishing
[D]Vishing
51. Which among the following is a correct definition of "Digital Divide"?
[A]gap between people having access to mobile and internet access
[B] gap between people having access to internet /IT and no internet/IT
[C]gap between people having access to broadband and narrowband internet
[D]gap between people having access to internet banking and normal banking
[A]Incoming Email
[B]Outgoing Email
[C]CD Roms
[D]Websites
[A]World Wide Web Consortium
[B]World Wide Web Company
[C]World Wide Web Center
[D]World Wide Web Command
[A]Version
[B]Update
[C]Help
[D]Patch
[A]ATM SafetyPIN
[B]ATM SafetyPro
[C]ATM SafetyCode
[D]ATM SafetySign
[A]City
[B]Bank
[C]Branch
[D]Account Type
[A]Virtual keyboard
[B]Finger Touching
[C]Touchscreen
[D]ShapeWriter
[A]Voiceband modem
[B]Wireless Modem
[C]Copper telephone Lines
[D]Sockets
[A]]Cntrl +A
[B]Cntrl +Z
[C]Cntrl +Y
[D]Cntrl +C
[A]F3
[B]F5
[C]F11
[D]F9
61. Which of the following is a suitable term for any programmable content of a hardware device configurations and data for application-specific integrated circuits (ASICs), programmable logic devices, etc.?[A]gap between people having access to mobile and internet access
[B] gap between people having access to internet /IT and no internet/IT
[C]gap between people having access to broadband and narrowband internet
[D]gap between people having access to internet banking and normal banking
52. Which among the following is the most common source of Viruses to the hard disk of your computer?
[B]Outgoing Email
[C]CD Roms
[D]Websites
53. What is the fullform of W3C?
[B]World Wide Web Company
[C]World Wide Web Center
[D]World Wide Web Command
54. Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
[B]Update
[C]Help
[D]Patch
55. What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order?
[B]ATM SafetyPro
[C]ATM SafetyCode
[D]ATM SafetySign
56. In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?
[B]Bank
[C]Branch
[D]Account Type
57. Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?
[B]Finger Touching
[C]Touchscreen
[D]ShapeWriter
58. ADSL data communications technology uses which of the following for faster data transmission ?
[B]Wireless Modem
[C]Copper telephone Lines
[D]Sockets
59. While working on Microsoft Word , which among the following is the command for "Undo"?
[B]Cntrl +Z
[C]Cntrl +Y
[D]Cntrl +C
60. While browsing the internet , which of the following key is used for full screen view?
[B]F5
[C]F11
[D]F9
[A]Hardware
[B]Software
[C]Firmware
[D]Malware
62. Most of the internet sites now a days use CSS primarily to enable the separation of document content (written in HTML or a similar markup language) from document presentation, including elements such as the layout, colors, and fonts. What is full form?
[B]Clear Style Sheet
[C]Cascading Style Sheet
[D]Common Style Sheet
63. What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode?
[B]Back Up
[C]To write contents of RAM to hard disc
[D]To improve download speed
64. Which of the following device is a volatile storage?
[B]Hard Disc
[C]Magnetic Tape
[D]Floppy Disc
65. Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for Virtual PC?
[B]Microsoft
[C]Intel
[D]Google
66. What is Office Open XML?
[B]A software
[C]A electronic device
[D]An international standard
67. What is the ultimate purpose of Defragmentation?
[B]Make the PC fastere
[C]Delete temporary files
[D]Reduce Power consumption
Create More Free Space is the main purpose however performance is also improved in most cases.
68. Which among the following is a device , that is used in computers to add external components?
[A]Storage Device such as USB
[B]Keyboard
[C]Ports / System Boards
[D]RAM
69. The term Round-trip delay time, used in telecommunication is replaced in computers with which among the following?
[B]Response time
[C]Entrance time
[D]Ping Time
70. The One-time password (OTPs) can be obtained by a customer, via which among the following?
[B]SMS on Mobile
[C]E-mail by applying for OTP online
[D]All of above
71. The terms "push and pull services" in context with the Banking are used in which among the following generally?
[B]Unit Banking
[C]Online Banking
[D]Mobile Banking
Mobile Banking, refers to sms sending on customer's request and without requests.
72. Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip At which among the above locations CVV or Card Security Code of an ATM is found?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3
73. What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system?
[B]Documentation
[C]Data Management
[D]Data History
74. Which among the following is an example of "Card not present transaction" in context with the Credit / Debit Cards?
[B]A person making an online purchase using his / her credit card
[C]A person making a purchase using mobile banking
[D]Both 2 & 3
75. Consider the following:
1. Application software
2. Hardware
3. Operating systems
The PDF documents are dependent upon which among the above to display the text, fonts, graphics, and other information contained by them?
[B]1 & 2
[C]1, 2 & 3
[D]None of them
76. As a person working in internet banking environment, why you should be aware of the "Dictionary attack"?
[B]It is used to determine a password
[C]It is used to access customer's account by determining other details
[D]It is used for stealing info from the Credit Card
77. Consider the following:
2. Hardware
3. Internet Programmes The terms Bug and Debugging are generally used in which among the above?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3
78. What is ISO 9362 is related to in context with Banking Technology?
[B]NEFT Transfers
[C]SWIFT Transfers
[D]All of them
SWIFT Transfers, refers to SWIFT Code
79. The Clearing House Interbank Payments System or CHIPS is a clearing system for large value transactions in which among the following countries / regions?
[A]United States
[B]United Kingdom
[C]Entire Europe
[D]Australia
80. The terms Goodput , Throughput and Maximum throughput are most closely associated with which among the following in computers?
[B]Response Time
[C]Command Line Interface
[D]Random memory
81. Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?
[A]Downtime
[B]Uptime
[C]Response time
[D]Runtime
82. What would be the number of bytes, transferred at the rate of 1 Kilobit per second?
[B]108
[C]125
[D]140
83. What do we call the automatic execution of high-priority computer programs that have been designed to pre-empt the use of computer resources?
[B]Background processing.
[C]Black processing.
[D]White processing.
84. What is the use of Digitizer as an input device?
[B]To convert graphic and pictorial data into analog inputs
[C]Debugging
[D]None of the above Uses
85. What do we call a storage device where the access time is effectively independent of the location of the data?
[B]Secondary Storage Device
[C]Primary Storage Device
[D]Gateway Device
86. What do we call the pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow and processing steps of a system?
[B]Flowchart
[C]Block diagram
[D]]Loop
87. The peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS) are used for measurement of ?
[B]Channel Capacity
[C]Frequency Modulation
[D]Amplitude distortion
88. What do we call a CPU that is designed specifically to handle the communications processing task with main purpose is to off-load communications processing task from the host computer so that the host computer can be dedicated for applications and data processing jobs?
[B]Front-end processor
[C]Node processor
[D]File Server
89. Which among the following can be done via Internet Banking?
2. Funds transfers between a customer's own transactional account and savings accounts
3. Investment purchase or sale
4. Loan applications and transactions, such as repayments of enrollments Choose correct option:
[A]1, 2 & 3
[B]2, 3 & 4
[C]1, 3 & 4
[D]1, 2 , 3 & 4
90. Dynamic Adhoc Wireless Networks (DAWN) usually come under ___?
[B]3 G
[C]4 G
[D]5G
91. Which among the following has been standardized in the IEEE 802.3 specification?
[A]Bluetooth
[B]Ethernet
[C]WiMAX
[D]All of them
[A]Cache
[B]Buffer
[C]Flash
[D]Trash
[A]FORTRAN
[B]C
[C]COBOL
[D]ALGOL
[A]EDP Device
[B]Console
[C]Jokey
[D]Link Device
1. an individual
2. a server
3. a company Choose the correct option:
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3
[A]Google
[B]Baidu
[C]Wolfram Alpha
[D]Yahoo
97. Consider the following:
1. C
2. C++
3. COBOL
Which among the above is/ are high-level languages (HLL)?
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3
[B]Ethernet
[C]WiMAX
[D]All of them
92. While browsing internet, what do we call the area of storage that compensates for the different speeds of data flow or timings of events by temporarily holding a block of data that is waiting to be processed?
[B]Buffer
[C]Flash
[D]Trash
93. Which among the following is a high-level language used to develop software applications in compact, efficient code that can be run on different types of computers with minimal change?
[B]C
[C]COBOL
[D]ALGOL
94. What do we call an input/output device on a computer, reserved for communication between the computer operator or maintenance engineer and the computer?
[B]Console
[C]Jokey
[D]Link Device
95. A Digital Certificate can identity __
2. a server
3. a company Choose the correct option:
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3
96. Which among the following is NOT a search engine?
[B]Baidu
[C]Wolfram Alpha
[D]Yahoo
Wolfram Alpha (is an answer engine)
97. Consider the following:
1. C
2. C++
3. COBOL
Which among the above is/ are high-level languages (HLL)?
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3
No comments:
Post a Comment