Saturday, 6 October 2018

IT related bits

1) If a computer is bind to store confidential or sensitive information in order to ensure that can not be accessed, which of the
following shall be made use of a) close circuit TV b) encryption c) buried line censors
d) locking and guarding e) None of the above
2) A computer can not boot if it does not have the :
a)compiler b) loader c) operating system d) assembler e) None of the above
3) Transfer of fund by computers without banks intervention can be done by
a) fax b) telephone c) camera d) IMB e) None of the above
4) The device that connect different types of networks is called :
a) b) hub c) bridge d) router e) None of the above
5) The processing machine that process the cheques of high speed in the clearing house is called
a) processor b) router cum shorter c) encoder d) all the above e) None of the above
6) The signature of the customer can be captured by
a) keyboard b) mouse c) scanner d) all of the above e) None of the above
7) The basic unit of a mark sheet into which you enter data in enclosed sheet is called
a) tab b) cell c) box d) range e) None of the above
8) Batch reports area : a) adhoc report b) EOD/BOD report c) available under business objective
d) generated by FRS data base e) None
9) First page of website in terminal : a) home page b) index c) java script d) bookmark e) None of the above

11) sending an e mail is equal to
a)picturing an event b) narrating a story c) writing a letter d) creating a drawing e) None of the above
12) The term VPN stands for
a)virtual private network b) vocational planning network c) voice program network d) voluntary program network e) None of the above
13) To move the cursor to the end of the document line
a)ctrl+end b) alt+ctrl+end c) page down d) ctrl+alt e) none of the above
14) The resolution of the computer screen is determine by which of the following
a)colour b) memory c) pixcels d) processing speed e) none of the above
15) Which of the following refer to a small single line network
a)LAN b) DSL c) RAM d) USB e) None of the above
16) The fraud and other type of crimes that happen on the internet network are called
a)internet fraud b) internet crimes c) cyber crimes d) electronic fraud e) None of the above
17) Which of the following term describe computer program better
a)hardware instruction b) input devices c) output devices d) central processing unit e) None of the above
18) Which of the following activities are carried through electronic means it is called
a)e-banking b) e-business in banking c) internet banking d) all the above e) None of these
19) A small line which flashes on the computer screen
a)cursor b) mouse c) cell d) all the above e) None of the above
20) computer use the ------number system to store the data and perform calculations
a)binary b) octal c) decimal d) hexadecimal e) None of the above
21) IFSC code is
a)11 digit alpha numeric code b) 10 digit alpha numeric c) 1 digit numeric d) 11 digit alpha code e) None
22) cannet is an example of
a)internet b) intranet c) both d) internal software e) None of the above
23) Which of the following makes use of the artificial intelligence
a) user of the computer b) computer c) operating system d) application systen e) the above all of
24) The name of UPI app in our bank is called
a)canmobile b) canara swipe c) e- infobook d) empower e) None of the above
25) The computer that co ordinate all computer activities into a network is known as
a)sever b) UPS c) modulator d) LAN e) None of the above
26) Which of the following is not a storage device
a)tape drive b) floppy disc drive c) hard disc drive d) printer driver e) None of the above
27) Servers of computers that provides resources to other computers connected to a
a)network b) mainframe c) supercomputer d) client e) None of the above
28) ASBA means - a)application supported by block account b) application supported by block amount c) application supported by
block arrangement d) application supported by block demat a/c e) None of the above
29) Collecting personal information and effectively bring another individual is known as the crime of
a)spooling b) identify theft c) spoofing d) hacking e) None of the above
30) Saving bank a/c is transferred from one cbs branch to another cbs branch. The a/c no is
a)does not change b) changes c) can not transferred a/c in cbs d) new branch dp code is added e) None
31) In page preview mode :
a)you can see all pages of document b) you can see the page you are currently working c) you can see only that page do not contain
document d) you can only see the title page of your document e) None of the above
32) Ram stands for -
a)random access memory b) ready application module c) read access memory d) remote access memory e) None
33) Printing device that create an image directly on paper by spraying ink and has substances recurring cost is known as - a) plotter b)
desk jet printer c) inkjet printer d) dot matrix printer e) None of the above
34) --------is data that has been organized or presented in meaningful fashion
a)process b)software c)storage d)information e) None of the above
35) The term cyber law stands for which of the following
a)the law governing cyber cafe establishment only b) the low governing computer activity c) the law relating to various information
technology d) any of the above e) None of the above
36. Which of the following package was first introduced in our bank - a) ibbs b)banks 2000 c)alpm d) cbs d) none
37) which of the following services are available in the atms
a) balance enquiry b)mobile top-up c)opening of term deposit a/c d)a & b e) a to c
38) which of the following can be used to select the entire document
a)cntrl +a b) alt+s c)shift+a d)cntrl+k e)cntrl+h
39) coded entities which are used to access to a computer system are called
a)entry code b)password c)security commands d)code words e)none of these
40) ________ is the appearance of typed characters - a)size b)format c)point d)colour e)none of these
41) idealing a customer must have one_______across the bank
a)account id b)customer id c) cbs id d)place id e) all of above
42) the term led stands for
a) light electronic device b) light electrical device c) light emitting device d)local electronic device e)none of above
43) junk email is also called - a)spam b)spoof c)sniffer script d) spool e) none of these
44) modem is connected to -a) a telephone line b) a keyboard c) a printer d) mouse e0 scaner
45) date and time are available on the desktop at - a) keyboard b) recycle bin c) my computer d) task bar e) none
46) information technology has resulted in - a) improved efficiency b) innovative products c)effective delivery system d) enhanced
productivity e)all of the above
47)the signature of customer can be captured by - a) keyboard b)scanner c) mouse d)all of the above e) none
48) to insert a word into the middle of a sentence
a) move the curser to the desired location in the sentence and type the new word
b) move the curser to the desired location in the sentence press enter key and type the new word
c) move the curse to the beginning of the sentence and start typing
d) retype the whole sentence e)none of these
49) whenever networks are not possible ,our bank has gone for satellite connections otherwise called as
a) winsat b) vsat c) sat d) vat e) tat
50) Unwanted repetitions massages, such as unsolicited bulk email is called as
A) spam b) trash c) Calibri d) courier e) none of these
ANSWER
1 B 2 C 3 D 4 D 5 E 6 C 7 B 8 B 9 A
11 C 12 A 13 A 14 C 15 A 16 C 17 D 18 D 19 A 20 A
21 A 22 B 23 E 24 A 25 D 26 D 27 A 28 A 29 D 30 A
31 A 32 A 33 A 34 D 35 C 36 C 37 D 38 B 39 B 40 B
41 B 42 C 43 A 44 A 45 D 46 E 47 B 48 B 49 B 50 A

No comments:

Post a Comment