11. Structured Query Language (SQL) is used in the following ?
[A]Create Databases
[B]Create & Modify Databases
[C]Create, Modify & Query Databases
[D]None of these
12. A file which has not been altered, compressed, or manipulated in any way by the computer is called?
[A]temp file
[B]raw file
[C]permanent file
[D]None of these
13. The word bandwidth is also used to mean ________?
[A]width of the data cable
[B]amount of data transferred
[C]number of the computers on a particular network
[D]None of these
14. NetBIOS was introduced in 1983 by which company as an improvement to the standard BIOS used by Windows-based computers?
[A]Dell
[B]IBM
[C]Compaq
[D]None of these
15. Which among the following is not a payment card technology?
[A]Magnetic Stripe Card
[B]Smart Card
[C]Fleet Card
[D]All of them are payment card technologies
16. Which among the following can be called an electronic check ?
[A]]Debit Card
[B]Smart Card
[C]Credit Card
[D]None of these
17. Which of the following was used in programming the first computers?
[A]Object code
[B]Source Code
[C]Machine Language
[D]Assembly Language
18. Any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data using which of the following ?
[A]CPU
[B]RAM
[C]ROM
[D]Network Interface Card
19. Which Microsoft-based technology was built to link desktop applications to the World Wide Web?
[A]Active Channel
[B]Active Desktop
[C]ActiveX
[D]None of these
20. What is the name of the digital circuit that performs arithmetic and logical operations in computers?
[A]Arithmetic Logic Unit
[B]Digital comparator
[C]Multiplexer
[D]None of these
[A]Create Databases
[B]Create & Modify Databases
[C]Create, Modify & Query Databases
[D]None of these
Create, Modify & Query Databases
12. A file which has not been altered, compressed, or manipulated in any way by the computer is called?
[A]temp file
[B]raw file
[C]permanent file
[D]None of these
raw file
13. The word bandwidth is also used to mean ________?
[A]width of the data cable
[B]amount of data transferred
[C]number of the computers on a particular network
[D]None of these
amount of data transferred
14. NetBIOS was introduced in 1983 by which company as an improvement to the standard BIOS used by Windows-based computers?
[A]Dell
[B]IBM
[C]Compaq
[D]None of these
IBM
Answer:
Answer:
15. Which among the following is not a payment card technology?
[A]Magnetic Stripe Card
[B]Smart Card
[C]Fleet Card
[D]All of them are payment card technologies
All of them are payment card technologies
16. Which among the following can be called an electronic check ?
[A]]Debit Card
[B]Smart Card
[C]Credit Card
[D]None of these
Debit Card
17. Which of the following was used in programming the first computers?
[A]Object code
[B]Source Code
[C]Machine Language
[D]Assembly Language
Machine Language
18. Any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data using which of the following ?
[A]CPU
[B]RAM
[C]ROM
[D]Network Interface Card
RAM
19. Which Microsoft-based technology was built to link desktop applications to the World Wide Web?
[A]Active Channel
[B]Active Desktop
[C]ActiveX
[D]None of these
ActiveX
20. What is the name of the digital circuit that performs arithmetic and logical operations in computers?
[A]Arithmetic Logic Unit
[B]Digital comparator
[C]Multiplexer
[D]None of these
Arithmetic Logic Unit
21. What is the full form of ADSL ?
[A]Automatic Digital Subscriber Line
[B]Asymmetric Direct Subscriber Line
[C]Asymmetric Digital Subscriber Line
[D]None of these
22. Which among the following key is used for checking grammar and spelling?
[A]F3
[B]F5
[C]F7
[D]None of these
23. An Autoresponder is a_______on mail server that automatically replies to e-mails ?
[A]command
[B]software
[C]program
[D]None of these
24. DDL is used to define the structure of a database, including the tables, columns, and data types that it contains. Its full form is ?
[A]Data Definition Language.
[B]Data Definition Link
[C]Determination Language.
[D]None of these
25. A DSLAM is a device used by Internet Service Providers (ISPs) to route incoming DSL connections to the Internet. What is its correct full form ?
[A]Digital Subscriber Line Access Multiplexer
[B]Digital Subscriber Line Access Multiplier
[C]Digital Service Line Access Multiplexer
[D]None of these
26. RUP Stands for "Rational Unified Process." RUP is a software development process from Rational, a division of _______?
[A]Microsoft
[B]IBM
[C]Compaq
[D]None of these
27. Which among the following defines web2.0 most precisely ?
[A]A New version of Internet
[B]A Series of technological improvements in World Wide Web
[C]A New labeling of old Softwares improved
[D]None of these
28. Microsoft first introduced an operating environment named Windows in which year?
[A]1977
[B]1985
[C]1988
[D]None of these
29. 32 bit operations were introduced for the first time by Microsoft in ________?
[A]windows 95
[B]Windows 3.0
[C]Windows 3.11
[D]None of these
30. A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify the location of a data object. What is correct full form?
[A]Graphical User Identifier
[B]Globally Unique Identifier
[C]Globally Unique Internet
[D]None of these
[A]Table
[B]Form
[C]Query
[D]Pivot Table
32. Which of the following Key is not found in normal computers / laptops?
[A]turn key
[B]alt key
[C]del key
[D]shift key
33. A hybrid computer exhibits the features of ______?
[A]analog computer
[B]digital computer
[C]both analog and digital computer
[D]mainframe computer
34. Structured programming languages such as C, COBOL and FORTRAN were used in which of the following computers?
[A]First Generation Computers
[B]Second Generation Computers
[C]Third Generation Computers
[D]Fourth Generation Computers
35. Which among the following statement is correct ? (More than one options are correct )
[A]Machine Language was developed prior to Assembly Language
[B]Assembly Language Was developed prior to Machine Language
[C]Both Assembly and machine languages were developed together
[D]First generation computers used machine language and second generation computers used assembly language
36. Which of the following are called Knowledge Information processing System?
[A]Fourth Generation Computers
[B]Fifth Generation Computers
[C]Laptops
[D]Servers
37. What is the correct full form of VLSI?
[A]Very Large Scale Integration
[B]Very large Software Integration
[C]Very large Scale Implementation
[D]Very Large Software Implementation
38. Which of the following generation of computers is associated with artificial intelligence?
[A]First
[B]Second
[C]Third
[D]Fifth
39. The sixth-generation era (sometimes referred to as the 128-bit era) refers to which of the following?
[A]Sixth generation Computers
[B]Laptops
[C]Super computers
[D]Video game Consoles
40. BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the following groups?
[A]ISDN
[B]IRC
[C]ISP
[D]Icons
[A]1000 bytes
[B]128 bytes
[C]1024 bytes
[D]1036 bytes
42. Which among the following is correct about 4GL?
[A]A computer brand
[B]A software brand
[C]A software program
[D]A programming language
43. First microprocessors were used in which of the following?
[A]Computers
[B]Calculators
[C]Telephones
[D]Printers
44. Which of the following transforms input data into output data?
[A]Peripherals
[B]RAM
[C]ROM
[D]CPU
45. In a computer file systems which among the following is top or first in hierarchy?
[A]root directory
[B]parent directory
[C]home directory
[D]working directory
46. What is HTTP 404?
[A]An error message indicating server not found
[B]An error message indicating moved permanently
[C]An error message indicating forbidden
[D]An error message indicating server found
47. Core Banking Solutions are developed to perform__?
[A]recording of transactions
[B] passbook maintenance
[C]interest calculations
[D]All of the above
48. Which among the following is not a security / privacy risk?
[A]Spam
[B]Hacking
[C]Virus
[D]Phishing
49. Now a days Vishing has become a criminal practice of using social engineering over which of the following?
[A]Social networking sites
[B]Mobile Phones
[C]E-mails
[D]Cyber cafés
50. When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?
[A]spam
[B]hacking
[C]Phishing
[D]Vishing
53. What is the fullform of W3C?
[A]World Wide Web Consortium
[B]World Wide Web Company
[C]World Wide Web Center
[D]World Wide Web Command
54. Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
[A]Version
[B]Update
[C]Help
[D]Patch
55. What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order?
[A]ATM SafetyPIN
[B]ATM SafetyPro
[C]ATM SafetyCode
[D]ATM SafetySign
56. In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?
[A]City
[B]Bank
[C]Branch
[D]Account Type
57. Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?
[A]Virtual keyboard
[B]Finger Touching
[C]Touchscreen
[D]ShapeWriter
58. ADSL data communications technology uses which of the following for faster data transmission ?
[A]Voiceband modem
[B]Wireless Modem
[C]Copper telephone Lines
[D]Sockets
59. While working on Microsoft Word , which among the following is the command for "Undo"?
[A]]Cntrl +A
[B]Cntrl +Z
[C]Cntrl +Y
[D]Cntrl +C
60. While browsing the internet , which of the following key is used for full screen view?
[A]F3
[B]F5
[C]F11
[D]F9
70. The One-time password (OTPs) can be obtained by a customer, via which among the following?
[A]Approaching the nearest Bank Branch
[B]SMS on Mobile
[C]E-mail by applying for OTP online
[D]All of above
71. The terms "push and pull services" in context with the Banking are used in which among the following generally?
[A]Rural Banking
[B]Unit Banking
[C]Online Banking
[D]Mobile Banking
72. Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip At which among the above locations CVV or Card Security Code of an ATM is found?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3
73. What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system?
[A]Segmentation
[B]Documentation
[C]Data Management
[D]Data History
74. Which among the following is an example of "Card not present transaction" in context with the Credit / Debit Cards?
[A]A person paying a restaurant bill by giving details of his credit card
[B]A person making an online purchase using his / her credit card
[C]A person making a purchase using mobile banking
[D]Both 2 & 3
75. Consider the following: 1. Application software 2. Hardware 3. Operating systems The PDF documents are dependent upon which among the above to display the text, fonts, graphics, and other information contained by them?
[A]Only 1
[B]1 & 2
[C]1, 2 & 3
[D]None of them
76. As a person working in internet banking environment, why you should be aware of the "Dictionary attack"?
[A]It is used to inject worms or viruses in the system
[B]It is used to determine a password
[C]It is used to access customer's account by determining other details
[D]It is used for stealing info from the Credit Card
77. Consider the following:
1. Software
2. Hardware
3. Internet Programmes The terms Bug and Debugging are generally used in which among the above?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3
78. What is ISO 9362 is related to in context with Banking Technology?
[A]RTGS Transfers
[B]NEFT Transfers
[C]SWIFT Transfers
[D]All of them
79. The Clearing House Interbank Payments System or CHIPS is a clearing system for large value transactions in which among the following countries / regions?
[A]United States
[B]United Kingdom
[C]Entire Europe
[D]Australia
80. The terms Goodput , Throughput and Maximum throughput are most closely associated with which among the following in computers?
[A]Bit Rate
[B]Response Time
[C]Command Line Interface
[D]Random memory
83. What do we call the automatic execution of high-priority computer programs that have been designed to pre-empt the use of computer resources?
[A]Foreground processing.
[B]Background processing.
[C]Black processing.
[D]White processing.
84. What is the use of Digitizer as an input device?
[A]To Convert graphic and pictorial data into binary inputs
[B]To convert graphic and pictorial data into analog inputs
[C]Debugging
[D]None of the above Uses
85. What do we call a storage device where the access time is effectively independent of the location of the data?
[A]Direct Access Storage Device
[B]Secondary Storage Device
[C]Primary Storage Device
[D]Gateway Device
86. What do we call the pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow and processing steps of a system?
[A]Algorithm
[B]Flowchart
[C]Block diagram
[D]]Loop
87. The peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS) are used for measurement of ?
[A]Bandwidth
[B]Channel Capacity
[C]Frequency Modulation
[D]Amplitude distortion
88. What do we call a CPU that is designed specifically to handle the communications processing task with main purpose is to off-load communications processing task from the host computer so that the host computer can be dedicated for applications and data processing jobs?
[A]Backend processor
[B]Front-end processor
[C]Node processor
[D]File Server
89. Which among the following can be done via Internet Banking?
1. Payments to third parties, including bill payments and telegraphic/wire transfers
2. Funds transfers between a customer's own transactional account and savings accounts
3. Investment purchase or sale
4. Loan applications and transactions, such as repayments of enrollments Choose correct option:
[A]1, 2 & 3
[B]2, 3 & 4
[C]1, 3 & 4
[D]1, 2 , 3 & 4
90. Dynamic Adhoc Wireless Networks (DAWN) usually come under ___?
[A]2 G
[B]3 G
[C]4 G
[D]5G
[A]Bluetooth
[B]Ethernet
[C]WiMAX
[D]All of them
92. While browsing internet, what do we call the area of storage that compensates for the different speeds of data flow or timings of events by temporarily holding a block of data that is waiting to be processed?
[A]Cache
[B]Buffer
[C]Flash
[D]Trash
93. Which among the following is a high-level language used to develop software applications in compact, efficient code that can be run on different types of computers with minimal change?
[A]FORTRAN
[B]C
[C]COBOL
[D]ALGOL
94. What do we call an input/output device on a computer, reserved for communication between the computer operator or maintenance engineer and the computer?
[A]EDP Device
[B]Console
[C]Jokey
[D]Link Device
95. A Digital Certificate can identity __
1. an individual
2. a server
3. a company Choose the correct option:
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3
96. Which among the following is NOT a search engine?
[A]Google
[B]Baidu
[C]Wolfram Alfa
[D]Yahoo
97. Consider the following: 1. C 2. C++ 3. COBOL Which among the above is/ are high-level languages (HLL)?
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3
21. What is the full form of ADSL ?
[A]Automatic Digital Subscriber Line
[B]Asymmetric Direct Subscriber Line
[C]Asymmetric Digital Subscriber Line
[D]None of these
Asymmetric Digital Subscriber Line
22. Which among the following key is used for checking grammar and spelling?
[A]F3
[B]F5
[C]F7
[D]None of these
F7
23. An Autoresponder is a_______on mail server that automatically replies to e-mails ?
[A]command
[B]software
[C]program
[D]None of these
program
24. DDL is used to define the structure of a database, including the tables, columns, and data types that it contains. Its full form is ?
[A]Data Definition Language.
[B]Data Definition Link
[C]Determination Language.
[D]None of these
Data Definition Language.
25. A DSLAM is a device used by Internet Service Providers (ISPs) to route incoming DSL connections to the Internet. What is its correct full form ?
[A]Digital Subscriber Line Access Multiplexer
[B]Digital Subscriber Line Access Multiplier
[C]Digital Service Line Access Multiplexer
[D]None of these
Digital Subscriber Line Access Multiplexer
26. RUP Stands for "Rational Unified Process." RUP is a software development process from Rational, a division of _______?
[A]Microsoft
[B]IBM
[C]Compaq
[D]None of these
IBM
27. Which among the following defines web2.0 most precisely ?
[A]A New version of Internet
[B]A Series of technological improvements in World Wide Web
[C]A New labeling of old Softwares improved
[D]None of these
A Series of technological improvements in World Wide Web
28. Microsoft first introduced an operating environment named Windows in which year?
[A]1977
[B]1985
[C]1988
[D]None of these
1985
29. 32 bit operations were introduced for the first time by Microsoft in ________?
[A]windows 95
[B]Windows 3.0
[C]Windows 3.11
[D]None of these
Windows 3.11
30. A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify the location of a data object. What is correct full form?
[A]Graphical User Identifier
[B]Globally Unique Identifier
[C]Globally Unique Internet
[D]None of these
Globally Unique Identifier
31. Which among the following are not Objects in Access Database?[A]Table
[B]Form
[C]Query
[D]Pivot Table
Pivot Table
32. Which of the following Key is not found in normal computers / laptops?
[A]turn key
[B]alt key
[C]del key
[D]shift key
turn key
33. A hybrid computer exhibits the features of ______?
[A]analog computer
[B]digital computer
[C]both analog and digital computer
[D]mainframe computer
both analog and digital computer
34. Structured programming languages such as C, COBOL and FORTRAN were used in which of the following computers?
[A]First Generation Computers
[B]Second Generation Computers
[C]Third Generation Computers
[D]Fourth Generation Computers
Third Generation Computers
35. Which among the following statement is correct ? (More than one options are correct )
[A]Machine Language was developed prior to Assembly Language
[B]Assembly Language Was developed prior to Machine Language
[C]Both Assembly and machine languages were developed together
[D]First generation computers used machine language and second generation computers used assembly language
A & D are correct
36. Which of the following are called Knowledge Information processing System?
[A]Fourth Generation Computers
[B]Fifth Generation Computers
[C]Laptops
[D]Servers
Fifth Generation Computers
37. What is the correct full form of VLSI?
[A]Very Large Scale Integration
[B]Very large Software Integration
[C]Very large Scale Implementation
[D]Very Large Software Implementation
Very Large Scale Integration
38. Which of the following generation of computers is associated with artificial intelligence?
[A]First
[B]Second
[C]Third
[D]Fifth
fifth
39. The sixth-generation era (sometimes referred to as the 128-bit era) refers to which of the following?
[A]Sixth generation Computers
[B]Laptops
[C]Super computers
[D]Video game Consoles
Video game Consoles
40. BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the following groups?
[A]ISDN
[B]IRC
[C]ISP
[D]Icons
ISP all are internet service providers
41. One kilobyte has _____?[A]1000 bytes
[B]128 bytes
[C]1024 bytes
[D]1036 bytes
1024 bytes
42. Which among the following is correct about 4GL?
[A]A computer brand
[B]A software brand
[C]A software program
[D]A programming language
A programming language, 4GL means fourth-generation programming language
43. First microprocessors were used in which of the following?
[A]Computers
[B]Calculators
[C]Telephones
[D]Printers
Calculators
44. Which of the following transforms input data into output data?
[A]Peripherals
[B]RAM
[C]ROM
[D]CPU
CPU
45. In a computer file systems which among the following is top or first in hierarchy?
[A]root directory
[B]parent directory
[C]home directory
[D]working directory
root directory
46. What is HTTP 404?
[A]An error message indicating server not found
[B]An error message indicating moved permanently
[C]An error message indicating forbidden
[D]An error message indicating server found
An error message indicating server not found
47. Core Banking Solutions are developed to perform__?
[A]recording of transactions
[B] passbook maintenance
[C]interest calculations
[D]All of the above
All of the above
48. Which among the following is not a security / privacy risk?
[A]Spam
[B]Hacking
[C]Virus
[D]Phishing
Spam
49. Now a days Vishing has become a criminal practice of using social engineering over which of the following?
[A]Social networking sites
[B]Mobile Phones
[C]E-mails
[D]Cyber cafés
Mobile Phones
50. When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?
[A]spam
[B]hacking
[C]Phishing
[D]Vishing
Phishing
Websites
Incoming Email
53. What is the fullform of W3C?
[A]World Wide Web Consortium
[B]World Wide Web Company
[C]World Wide Web Center
[D]World Wide Web Command
World Wide Web Consortium
54. Which among the following is used for removing a software bug / defect which is available for free of cost from the software provider?
[A]Version
[B]Update
[C]Help
[D]Patch
Patch
55. What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order?
[A]ATM SafetyPIN
[B]ATM SafetyPro
[C]ATM SafetyCode
[D]ATM SafetySign
ATM SafetyPIN
56. In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?
[A]City
[B]Bank
[C]Branch
[D]Account Type
first three digits repr
57. Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?
[A]Virtual keyboard
[B]Finger Touching
[C]Touchscreen
[D]ShapeWriter
Virtual keyboard
58. ADSL data communications technology uses which of the following for faster data transmission ?
[A]Voiceband modem
[B]Wireless Modem
[C]Copper telephone Lines
[D]Sockets
Copper telephone Lines
59. While working on Microsoft Word , which among the following is the command for "Undo"?
[A]]Cntrl +A
[B]Cntrl +Z
[C]Cntrl +Y
[D]Cntrl +C
Cntrl +Z
60. While browsing the internet , which of the following key is used for full screen view?
[A]F3
[B]F5
[C]F11
[D]F9
F11
Round-trip delay time, used in telecommunication is replaced in computers with which among the following?
[A]Access time
[B]Response time
[C]Entrance time
[D]Ping Time
[A]Access time
[B]Response time
[C]Entrance time
[D]Ping Time
Ping Time
70. The One-time password (OTPs) can be obtained by a customer, via which among the following?
[A]Approaching the nearest Bank Branch
[B]SMS on Mobile
[C]E-mail by applying for OTP online
[D]All of above
SMS on Mobile
[A]Rural Banking
[B]Unit Banking
[C]Online Banking
[D]Mobile Banking
Mobile Banking, refers to sms sending on customer's request and without requests.
72. Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip At which among the above locations CVV or Card Security Code of an ATM is found?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3
1 & 3
73. What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system?
[A]Segmentation
[B]Documentation
[C]Data Management
[D]Data History
Documentation
74. Which among the following is an example of "Card not present transaction" in context with the Credit / Debit Cards?
[A]A person paying a restaurant bill by giving details of his credit card
[B]A person making an online purchase using his / her credit card
[C]A person making a purchase using mobile banking
[D]Both 2 & 3
Both 2 & 3
75. Consider the following: 1. Application software 2. Hardware 3. Operating systems The PDF documents are dependent upon which among the above to display the text, fonts, graphics, and other information contained by them?
[A]Only 1
[B]1 & 2
[C]1, 2 & 3
[D]None of them
None of them
76. As a person working in internet banking environment, why you should be aware of the "Dictionary attack"?
[A]It is used to inject worms or viruses in the system
[B]It is used to determine a password
[C]It is used to access customer's account by determining other details
[D]It is used for stealing info from the Credit Card
It is used to determine a password
77. Consider the following:
1. Software
2. Hardware
3. Internet Programmes The terms Bug and Debugging are generally used in which among the above?
[A]1 & 2
[B]2 & 3
[C]1 & 3
[D]1, 2 & 3
1, 2 & 3
78. What is ISO 9362 is related to in context with Banking Technology?
[A]RTGS Transfers
[B]NEFT Transfers
[C]SWIFT Transfers
[D]All of them
SWIFT Transfers, refers to SWIFT Code
79. The Clearing House Interbank Payments System or CHIPS is a clearing system for large value transactions in which among the following countries / regions?
[A]United States
[B]United Kingdom
[C]Entire Europe
[D]Australia
United States
80. The terms Goodput , Throughput and Maximum throughput are most closely associated with which among the following in computers?
[A]Bit Rate
[B]Response Time
[C]Command Line Interface
[D]Random memory
Bit Rate
125
83. What do we call the automatic execution of high-priority computer programs that have been designed to pre-empt the use of computer resources?
[A]Foreground processing.
[B]Background processing.
[C]Black processing.
[D]White processing.
Foreground processing
84. What is the use of Digitizer as an input device?
[A]To Convert graphic and pictorial data into binary inputs
[B]To convert graphic and pictorial data into analog inputs
[C]Debugging
[D]None of the above Uses
To convert graphic and pictorial data into binary inputs
85. What do we call a storage device where the access time is effectively independent of the location of the data?
[A]Direct Access Storage Device
[B]Secondary Storage Device
[C]Primary Storage Device
[D]Gateway Device
Direct Access Storage Device
86. What do we call the pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow and processing steps of a system?
[A]Algorithm
[B]Flowchart
[C]Block diagram
[D]]Loop
Flowchart
87. The peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS) are used for measurement of ?
[A]Bandwidth
[B]Channel Capacity
[C]Frequency Modulation
[D]Amplitude distortion
Bandwidth
88. What do we call a CPU that is designed specifically to handle the communications processing task with main purpose is to off-load communications processing task from the host computer so that the host computer can be dedicated for applications and data processing jobs?
[A]Backend processor
[B]Front-end processor
[C]Node processor
[D]File Server
Front-end processor
89. Which among the following can be done via Internet Banking?
1. Payments to third parties, including bill payments and telegraphic/wire transfers
2. Funds transfers between a customer's own transactional account and savings accounts
3. Investment purchase or sale
4. Loan applications and transactions, such as repayments of enrollments Choose correct option:
[A]1, 2 & 3
[B]2, 3 & 4
[C]1, 3 & 4
[D]1, 2 , 3 & 4
1, 2 , 3 & 4
90. Dynamic Adhoc Wireless Networks (DAWN) usually come under ___?
[A]2 G
[B]3 G
[C]4 G
[D]5G
5G
91. Which among the following has been standardized in the IEEE 802.3 specification?[A]Bluetooth
[B]Ethernet
[C]WiMAX
[D]All of them
Ethernet
92. While browsing internet, what do we call the area of storage that compensates for the different speeds of data flow or timings of events by temporarily holding a block of data that is waiting to be processed?
[A]Cache
[B]Buffer
[C]Flash
[D]Trash
Buffer
93. Which among the following is a high-level language used to develop software applications in compact, efficient code that can be run on different types of computers with minimal change?
[A]FORTRAN
[B]C
[C]COBOL
[D]ALGOL
C
94. What do we call an input/output device on a computer, reserved for communication between the computer operator or maintenance engineer and the computer?
[A]EDP Device
[B]Console
[C]Jokey
[D]Link Device
Console
95. A Digital Certificate can identity __
1. an individual
2. a server
3. a company Choose the correct option:
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3
1, 2 & 3
96. Which among the following is NOT a search engine?
[A]Google
[B]Baidu
[C]Wolfram Alfa
[D]Yahoo
Wolfram Alpha (is an answer engine)
97. Consider the following: 1. C 2. C++ 3. COBOL Which among the above is/ are high-level languages (HLL)?
[A]Only 1
[B]1 & 2
[C]2 & 3
[D]1, 2 & 3
1, 2 & 3
No comments:
Post a Comment