Monday, 19 November 2012

Bank PO Computer Awareness(01-97)


Bank PO Computer Awareness(01-97)

1. Which among the following is responsible for allocating IP addresses and managing the domain name system.?
[A]Domain name warehousing
[B]Internet Corporation For Assigned Names and Numbers
[C]Internet Assigned Numbers Authority
[D]None of these

2. The performance of a hard drive or other storage device , meaning how long it takes to locate a file is called ?
[A]Response Time
[B]Access Time
[C]Quick Time
[D]None of these





3. Alerts are mostly appear in ______?
[A]Check Box
[B]Combo Box
[C]Dialog Box
[D]None of these

4. Which of the following was used in first generation computers?
[A]Machine Language
[B]High Language
[C]Assembly Language
[D]None of these

5. A unit of data storage that equals 2 to the 70th power is called?
[A]Zebibyte
[B]Yottabite
[C]Yobibite
[D]None of these

6. What is used in most programs that is a part of a program and guides the user through certain steps?
[A]Software
[B]Wizard
[C]Wiki
[D]None of these

7. A generic name for Intel processors released after the original 8086 processor is ______ ?
[A]Pentium
[B]x86
[C]Pentium 286
[D]None of these

8. A network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called ?
[A]My network
[B]Virtual private Network
[C]Social Network
[D]None of these

9. V-RAM is used for access of the following ?
[A]Video & Graphics
[B]Text & Images
[C]programs
[D]None of these

10. Panther (10.3), Jaguar (10.2), Puma (10.1), and Cheetah (10.0) are examples of _______?
[A]Windows OS
[B]Mac OS
[C]Open Operating Systems
[D]None of these

11. Structured Query Language (SQL) is used in the following ?
[A]Create Databases
[B]Create & Modify Databases
[C]Create, Modify & Query Databases
[D]None of these

12. A file which has not been altered, compressed, or manipulated in any way by the computer is called?
[A]temp file
[B]raw file
[C]permanent file
[D]None of these

13. The word bandwidth is also used to mean ________?
[A]width of the data cable
[B]amount of data transferred
[C]number of the computers on a particular network
[D]None of these

14. NetBIOS was introduced in 1983 by which company as an improvement to the standard BIOS used by Windows-based computers?
[A]Dell
[B]IBM
[C]Compaq
[D]None of these

15. Which among the following is not a payment card technology?
[A]Magnetic Stripe Card
[B]Smart Card
[C]Fleet Card
[D]All of them are payment card technologies

16. Which among the following can be called an electronic check ?
[A]]Debit Card
[B]Smart Card
[C]Credit Card
[D]None of these

17. Which of the following was used in programming the first computers?
[A]Object code
[B]Source Code
[C]Machine Language
[D]Assembly Language

18. Any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data using which of the following ?
[A]CPU
[B]RAM
[C]ROM
[D]Network Interface Card

19. Which Microsoft-based technology was built to link desktop applications to the World Wide Web?
[A]Active Channel
[B]Active Desktop
[C]ActiveX
[D]None of these

20. What is the name of the digital circuit that performs arithmetic and logical operations in computers?
[A]Arithmetic Logic Unit
[B]Digital comparator
[C]Multiplexer
[D]None of these

21. What is the full form of ADSL ?
[A]Automatic Digital Subscriber Line
[B]Asymmetric Direct Subscriber Line
[C]Asymmetric Digital Subscriber Line
[D]None of these

22. Which among the following key is used for checking grammar and spelling?
[A]F3
[B]F5
[C]F7
[D]None of these

23. An Autoresponder is a_______on mail server that automatically replies to e-mails ?
[A]command
[B]software
[C]program
[D]None of these

24. DDL is used to define the structure of a database, including the tables, columns, and data types that it contains. Its full form is ?
[A]Data Definition Language.
[B]Data Definition Link
[C]Determination Language.
[D]None of these

25. A DSLAM is a device used by Internet Service Providers (ISPs) to route incoming DSL connections to the Internet. What is its correct full form ?
[A]Digital Subscriber Line Access Multiplexer
[B]Digital Subscriber Line Access Multiplier
[C]Digital Service Line Access Multiplexer
[D]None of these

26. RUP Stands for "Rational Unified Process." RUP is a software development process from Rational, a division of _______?
[A]Microsoft
[B]IBM
[C]Compaq
[D]None of these

27. Which among the following defines web2.0 most precisely ?
[A]A New version of Internet
[B]A Series of technological improvements in World Wide Web
[C]A New labeling of old Softwares improved
[D]None of these

28. Microsoft first introduced an operating environment named Windows in which year?
[A]1977
[B]1985
[C]1988
[D]None of these

29. 32 bit operations were introduced for the first time by Microsoft in ________?
[A]windows 95
[B]Windows 3.0
[C]Windows 3.11
[D]None of these

30. A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify the location of a data object. What is correct full form?
[A]Graphical User Identifier
[B]Globally Unique Identifier
[C]Globally Unique Internet
[D]None of these

31. Which among the following are not Objects in Access Database?
[A]Table
[B]Form
[C]Query
[D]Pivot Table

32. Which of the following Key is not found in normal computers / laptops?
[A]turn key
[B]alt key
[C]del key
[D]shift key

33. A hybrid computer exhibits the features of ______?
[A]analog computer
[B]digital computer
[C]both analog and digital computer
[D]mainframe computer

34. Structured programming languages such as C, COBOL and FORTRAN were used in which of the following computers?
[A]First Generation Computers
[B]Second Generation Computers
[C]Third Generation Computers
[D]Fourth Generation Computers

35. Which among the following statement is correct ? (More than one options are correct )
[A]Machine Language was developed prior to Assembly Language
[B]Assembly Language Was developed prior to Machine Language
[C]Both Assembly and machine languages were developed together
[D]First generation computers used machine language and second generation computers used assembly language
A & D are correct

36. Which of the following are called Knowledge Information processing System?
[A]Fourth Generation Computers
[B]Fifth Generation Computers
[C]Laptops
[D]Servers

37. What is the correct full form of VLSI?
[A]Very Large Scale Integration
[B]Very large Software Integration
[C]Very large Scale Implementation
[D]Very Large Software Implementation

38. Which of the following generation of computers is associated with artificial intelligence?
[A]First
[B]Second
[C]Third
[D]Fifth

39. The sixth-generation era (sometimes referred to as the 128-bit era) refers to which of the following?
[A]Sixth generation Computers
[B]Laptops
[C]Super computers
[D]Video game Consoles

40. BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the following groups?
[A]ISDN
[B]IRC
[C]ISP
[D]Icons

ISP all are internet service providers



41. One kilobyte has _____?
[A]1000 bytes
[B]128 bytes
[C]1024 bytes
[D]1036 bytes

42. Which among the following is correct about 4GL?
[A]A computer brand
[B]A software brand
[C]A software program
[D]A programming language

A programming language, 4GL means fourth-generation programming language

43. First microprocessors were used in which of the following?
[A]Computers
[B]Calculators
[C]Telephones
[D]Printers

44. Which of the following transforms input data into output data?
[A]Peripherals
[B]RAM
[C]ROM
[D]CPU

45. In a computer file systems which among the following is top or first in hierarchy?
[A]root directory
[B]parent directory
[C]home directory
[D]working directory

46. What is HTTP 404?
[A]An error message indicating server not found
[B]An error message indicating moved permanently
[C]An error message indicating forbidden
[D]An error message indicating server found

47. Core Banking Solutions are developed to perform__?
[A]recording of transactions
[B] passbook maintenance
[C]interest calculations
[D]All of the above

48. Which among the following is not a security / privacy risk?
[A]Spam
[B]Hacking
[C]Virus
[D]Phishing

49. Now a days Vishing has become a criminal practice of using social engineering over which of the following?
[A]Social networking sites
[B]Mobile Phones
[C]E-mails
[D]Cyber cafés

50. When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?
[A]spam
[B]hacking
[C]Phishing
[D]Vishing


51. Which among the following is a correct definition of "Digital Divide"?
[A]gap between people having access to mobile and internet access
[B] gap between people having access to internet /IT and no internet/IT
[C]gap between people having access to broadband and narrowband internet
[D]gap between people having access to internet banking and normal banking

52. Which among the following is the most common source of Viruses to the hard disk of your computer?
[A]Incoming Email
[B]Outgoing Email
[C]CD Roms
[D]Websites

53. What is the fullform of W3C?
[A]World Wide Web Consortium
[B]World Wide Web Company
[C]World Wide Web Center
[D]World Wide Web Command

54. Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
[A]Version
[B]Update
[C]Help
[D]Patch

55. What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order?
[A]ATM SafetyPIN
[B]ATM SafetyPro
[C]ATM SafetyCode
[D]ATM SafetySign

56. In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?
[A]City
[B]Bank
[C]Branch
[D]Account Type

57. Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?
[A]Virtual keyboard
[B]Finger Touching
[C]Touchscreen
[D]ShapeWriter

58. ADSL data communications technology uses which of the following for faster data transmission ?
[A]Voiceband modem
[B]Wireless Modem
[C]Copper telephone Lines
[D]Sockets

59. While working on Microsoft Word , which among the following is the command for "Undo"?
[A]]Cntrl +A
[B]Cntrl +Z
[C]Cntrl +Y
[D]Cntrl +C

60. While browsing the internet , which of the following key is used for full screen view?
[A]F3
[B]F5
[C]F11
[D]F9

61. Which of the following is a suitable term for any programmable content of a hardware device configurations and data for application-specific integrated circuits (ASICs), programmable logic devices, etc.?
[A]Hardware
[B]Software
[C]Firmware
[D]Malware

62. Most of the internet sites now a days use CSS primarily to enable the separation of document content (written in HTML or a similar markup language) from document presentation, including elements such as the layout, colors, and fonts. What is full form?
[A]Cascading Style Software
[B]Clear Style Sheet
[C]Cascading Style Sheet
[D]Common Style Sheet

63. What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled  devices on Sleep mode?
[A]Reduce Power consumption
[B]Back Up
[C]To write contents of RAM to hard disc
[D]To improve download speed

64. Which of the following device is a volatile storage?
[A]RAM
[B]Hard Disc
[C]Magnetic Tape
[D]Floppy Disc

65. Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for Virtual PC?
[A]IBM
[B]Microsoft
[C]Intel
[D]Google

66. What is Office Open XML?
[A]A file format
[B]A software
[C]A electronic device
[D]An international standard

67. What is the ultimate purpose of Defragmentation?
[A]Make the PC faster
[B]Make the PC fastere
[C]Delete temporary files
[D]Reduce Power consumption

Create More Free Space is the main purpose however performance is also improved in most cases.

68. Which among the following is a device , that is used in computers to add external components?
[A]Storage Device such as USB
[B]Keyboard
[C]Ports / System Boards
[D]RAM

69. The term Round-trip delay time, used in telecommunication is replaced in computers with which among the following?
[A]Access time
[B]Response time
[C]Entrance time
[D]Ping Time

70. The One-time password (OTPs) can be obtained by a customer, via which among the following?
[A]Approaching the nearest Bank Branch
[B]SMS on Mobile
[C]E-mail by applying for OTP online
[D]All of above

71. The terms "push and pull services" in context with the Banking are used in which among the following generally?
[A]Rural Banking
[B]Unit Banking
[C]Online Banking
[D]Mobile Banking

Mobile Banking, refers to sms sending on customer's request and without requests.

72. Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip At which among the above locations CVV or Card Security Code of an ATM is found?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3

73. What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system?
[A]Segmentation
[B]Documentation
[C]Data Management
[D]Data History

74. Which among the following is an example of "Card not present transaction" in context with the Credit / Debit Cards?
[A]A person paying a restaurant bill by giving details of his credit card
[B]A person making an online purchase using his / her credit card
[C]A person making a purchase using mobile banking
[D]Both 2 & 3

75. Consider the following: 
1. Application software 
2. Hardware 
 3. Operating systems 
The PDF documents are dependent upon which among the above to display the text, fonts, graphics, and other information contained by them?
[A]Only 1
[B]1 & 2
[C]1, 2 & 3
[D]None of them

76. As a person working in internet banking environment, why you should be aware of the "Dictionary attack"?
[A]It is used to inject worms or viruses in the system
[B]It is used to determine a password
[C]It is used to access customer's account by determining other details
[D]It is used for stealing info from the Credit Card

77. Consider the following:
1. Software
2. Hardware
3. Internet Programmes The terms Bug and Debugging are generally used in which among the above?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3

78. What is ISO 9362 is related to in context with Banking Technology?
[A]RTGS Transfers
[B]NEFT Transfers
[C]SWIFT Transfers
[D]All of them

SWIFT Transfers, refers to SWIFT Code

79. The Clearing House Interbank Payments System or CHIPS is a clearing system for large value transactions in which among the following countries / regions?
[A]United States
[B]United Kingdom
[C]Entire Europe
[D]Australia

80. The terms Goodput , Throughput and Maximum throughput are most closely associated with which among the following in computers?
[A]Bit Rate
[B]Response Time
[C]Command Line Interface
[D]Random memory


81. Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?
[A]Downtime
[B]Uptime
[C]Response time
[D]Runtime


82. What would be the number of bytes, transferred at the rate of 1 Kilobit per second?
[A]100
[B]108
[C]125
[D]140


83. What do we call the automatic execution of high-priority computer programs that have been designed to pre-empt the use of computer resources?
[A]Foreground processing.
[B]Background processing.
[C]Black processing.
[D]White processing.


84. What is the use of Digitizer as an input device?
[A]To Convert graphic and pictorial data into binary inputs
[B]To convert graphic and pictorial data into analog inputs
[C]Debugging
[D]None of the above Uses


85. What do we call a storage device where the access time is effectively independent of the location of the data?
[A]Direct Access Storage Device
[B]Secondary Storage Device
[C]Primary Storage Device
[D]Gateway Device


86. What do we call the pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow and processing steps of a system?
[A]Algorithm
[B]Flowchart
[C]Block diagram
[D]]Loop


87. The peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS) are used for measurement of ?
[A]Bandwidth
[B]Channel Capacity
[C]Frequency Modulation
[D]Amplitude distortion


88. What do we call a CPU that is designed specifically to handle the communications processing task with main purpose is to off-load communications processing task from the host computer so that the host computer can be dedicated for applications and data processing jobs?
[A]Backend processor
[B]Front-end processor
[C]Node processor
[D]File Server


89. Which among the following can be done via Internet Banking?
1. Payments to third parties, including bill payments and telegraphic/wire transfers
2. Funds transfers between a customer's own transactional account and savings accounts
3. Investment purchase or sale
4. Loan applications and transactions, such as repayments of enrollments Choose correct option:
[A]1, 2 & 3
[B]2, 3 & 4
[C]1, 3 & 4
[D]1, 2 , 3 & 4


90. Dynamic Adhoc Wireless Networks (DAWN) usually come under ___?
[A]2 G
[B]3 G
[C]4 G
[D]5G


91. Which among the following has been standardized in the IEEE 802.3 specification?

[A]Bluetooth
[B]Ethernet
[C]WiMAX
[D]All of them


92. While browsing internet, what do we call the area of storage that compensates for the different speeds of  data flow or timings of events by temporarily holding a block of data that is waiting to be processed?
[A]Cache
[B]Buffer
[C]Flash
[D]Trash


93. Which among the following is a high-level language used to develop software applications in compact, efficient code that can be run on different types of computers with minimal change?
[A]FORTRAN
[B]C
[C]COBOL
[D]ALGOL


94. What do we call an input/output device on a computer, reserved for communication between the computer operator or maintenance engineer and the computer?
[A]EDP Device
[B]Console
[C]Jokey
[D]Link Device


95. A Digital Certificate can identity __
1. an individual
2. a server
3. a company Choose the correct option:
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3


96. Which among the following is NOT a search engine?
[A]Google
[B]Baidu
[C]Wolfram Alpha
[D]Yahoo


Wolfram Alpha (is an answer engine)

97. Consider the following:
1. C
2. C++
3. COBOL
Which among the above is/ are high-level languages (HLL)?
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3


No comments:

Post a Comment