About Us Terms and Conditions, Disclaimer
Click Here to Download Zee Study Live Mobile Application

Showing posts with label Bank PO Computer Awareness. Show all posts
Showing posts with label Bank PO Computer Awareness. Show all posts

Wednesday 12 November 2014

Bank PO Computer Awareness

91. Which among the following has been standardized in the IEEE 802.3 specification?
[A]Bluetooth
[B]Ethernet
[C]WiMAX
[D]All of them

Bank PO Computer Awareness

Question: 1

Which among the following is the time period during which a computer is malfunctioning or not operating correctly due to machine failures?

(A)Downtime
(B)Uptime
(C)Response time
(D)Runtime
show answer

Question: 2

What would be the number of bytes, transferred at the rate of 1 Kilobit per second?

(A)100
(B)108
(C)125
(D)140
show answer

Question: 3

What do we call the automatic execution of high-priority computer programs that have been designed to pre-empt the use of computer resources?

(A)Foreground processing.
(B)Background processing.
(C)Black processing.
(D)White processing.
show answer

Question: 4

What is the use of Digitizer as an input device?

(A)To Convert graphic and pictorial data into binary inputs
(B)To convert graphic and pictorial data into analog inputs
(C)Debugging
(D)None of the above Uses
show answer

Question: 5

What do we call a storage device where the access time is effectively independent of the location of the data?

(A)Direct Access Storage Device
(B)Secondary Storage Device
(C)Primary Storage Device
(D)Gateway Device
show answer

Question: 6

What do we call the pictorial representation that uses predefined symbols to describe either the logic of a computer program or the data flow and processing steps of a system?

(A)Algorithm
(B)Flowchart
(C)Block diagram
(D) Loop
show answer

Question: 7

The peak cell rate (PCR), sustainable cell rate (SCR), and maximum burst size (MBS) are used for measurement of ?

(A)Bandwidth
(B)Channel Capacity
(C)Frequency Modulation
(D)Amplitude distortion
show answer

Question: 8

What do we call a CPU that is designed specifically to handle the communications processing task with main purpose is to off-loadA sales charge assessed by certain mutual funds (load funds) to cover selling costs. A front end load is charged at the time of purchase. ..... communications processing task from the host computer so that the host computer can be dedicated for applications and data processing jobs?

(A)Backend processor
(B)Front-end processor
(C)Node processor
(D)File Server
show answer

Question: 9

Which among the following can be done via Internet Banking?
1. Payments to third parties, including bill payments and telegraphic/wire transfers
2. Funds transfers between a customer's own transactional account and savings accounts
3. Investment purchase or sale
4. Loan applications and transactions, such as repayments of enrollments Choose correct option:

(A)1, 2 & 3
(B)2, 3 & 4
(C)1, 3 & 4
(D)1, 2 , 3 & 4
show answer

Question: 10

Dynamic Adhoc Wireless Networks (DAWN) usually come under ___?

(A)2 G
(B)3 G
(C)4 G
(D)5G
show answer

Click on the Next Page for More Questions

1 2 3 4 5 6 7 8 910

Bank PO Computer Awareness

Question: 71

The terms "push and pull services" in context with the Banking are used in which among the following generally?

(A)Rural Banking
(B)Unit Banking
(C)Online Banking
(D)Mobile Banking
show answer

Question: 72

Consider the following in context with the CVV or Card security code of an ATM or Credit Card:
1.Magnetic Stripe
2.Front of the in embossed or printed digits
3.Back of the card as a separate group of 3 digits to the right of the signature strip At which among the above locations CVV or Card Security Code of an ATM is found?

(A)1 & 2
(B)2 & 3
(C)1 & 3
(D)1, 2 & 3
show answer

Question: 73

What do we call the process of collecting, organizing, storing and otherwise maintaining a complete historical record of programs and other documents used or prepared during the different phases of the system?

(A)Segmentation
(B)Documentation
(C)Data Management
(D)Data History
show answer

Question: 74

Which among the following is an example of "Card not present transaction" in context with the Credit / Debit Cards?

(A)A person paying a restaurant bill by giving details of his credit card
(B)A person making an online purchase using his / her credit card
(C)A person making a purchase using mobile banking
(D)Both 2 & 3
show answer

Question: 75

Consider the following: 1. Application softwareThe computer programme which contains the instructions to make the hardware work are called software. There are two primary software categories viz. Operating Systems or .....
2. Hardware
3. Operating systems
The PDF documents are dependent upon which among the above to display the text, fonts, graphics, and other information contained by them?

(A)Only 1
(B)1 & 2
(C)1, 2 & 3
(D)None of them
show answer

Question: 76

As a person working in internet banking environmentenvironment, why you should be aware of the "Dictionary attack"?

(A)It is used to inject worms or viruses in the system
(B)It is used to determine a password
(C)It is used to access customer's account by determining other details
(D)It is used for stealing info from the Credit Card
show answer

Question: 77

Consider the following:
1. Software
2. Hardware
3. Internet Programmes The terms Bug and Debugging are generally used in which among the above?

(A)1 & 2
(B)2 & 3
(C)1 & 3
(D)1, 2 & 3
show answer

Question: 78

What is ISO 9362 is related to in context with Banking Technology?

(A)RTGS Transfers
(B)NEFT Transfers
(C)SWIFT Transfers
(D)All of them
show answer

Question: 79


(A)United States
(B)United Kingdom
(C)Entire Europe
(D)Australia
show answer

Question: 10

The terms Goodput , Throughput and Maximum throughput are most closely associated with which among the following in computers?

(A)Bit Rate
(B)Response Time
(C)Command Line Interface
(D)Random memory
show answer

Click on the Next Page for More Questions

1 2 3 4 5 6 78 9 10

Bank PO Computer Awareness

Question: 61

Which of the following is a suitable term for any programmable content of a hardware device configurations and data for application-specific integrated circuitsA monolithic integrated circuit (IC) also known as microchip, silicon chip, computer chip or chip is basicaly a miniaturized electronic circuit that consists of mainly ..... (ASICs), programmable logic devices, etc.?

(A)Hardware
(B)SoftwareThe computer programme which contains the instructions to make the hardware work are called software. There are two primary software categories viz. Operating Systems or .....
(C)Firmware
(D)Malware
show answer

Question: 62

Most of the internet sites now a days use CSS primarily to enable the separation of document content (written in HTML or a similar markupA charge levied by a broker when selling securities from its own account to a customer. These sales as principals to a customer take place ..... language) from document presentation, including elements such as the layout, colors, and fonts. What is full form?

(A)Cascading Style Software
(B)Clear Style Sheet
(C)Cascading Style Sheet
(D)Common Style Sheet
show answer

Question: 63

What is the purpose of keeping electronic devices such as computers, televisions, and remote controlled devices on Sleep mode?

(A)Reduce Power consumption
(B)Back Up
(C)To write contents of RAM to hard disc
(D)To improve download speed
show answer

Question: 64

Which of the following device is a volatile storage?

(A)RAM
(B)Hard Disc
(C)Magnetic Tape
(D)Floppy Disc
show answer

Question: 65

Which of the following company owns/ uses the Virtual Hard Disk (.vhd) format for Virtual PC?

(A)IBM
(B)Microsoft
(C)Intel
(D)Google
show answer

Question: 66

What is Office Open XML?

(A)A file format
(B)A software
(C)A electronic device
(D)An international standard
show answer

Question: 67

What is the ultimate purpose of Defragmentation?

(A)Make the PC faster
(B)Make the PC fastere
(C)Delete temporary files
(D)Reduce Power consumption
show answer

Question: 68

Which among the following is a device , that is used in computers to add external components?

(A)Storage Device such as USB
(B)KeyboardThe standard microcomputer keyboard consists of 104 keys arranged in the standard typewriter or QWERTY layout. A separate numeric keypad is at the right side .....
(C)Ports / System Boards
(D)RAM
show answer

Question: 69

The term Round-trip delay time, used in telecommunication is replaced in computers with which among the following?

(A)Access time
(B)Response time
(C)Entrance time
(D)Ping Time
show answer

Question: 70

The One-time password (OTPs) can be obtained by a customer, via which among the following?

(A)Approaching the nearest Bank Branch
(B)SMS on Mobile
(C)E-mail by applying for OTP online
(D)All of above
show answer

Click on the Next Page for More Questions

1 2 3 4 5 67 8 9 10

Bank PO Computer Awareness

Question: 51

Which among the following is a correct definition of "Digital Divide"?

(A)gap between people having access to mobile and internet access
(B)gap between people having access to internet /IT and no internet/IT
(C) gap between people having access to broadband and narrowband internet
(D)gap between people having access to internet banking and normal banking
show answer

Question: 52

Which among the following is the most common source of Viruses to the hard disk of your computer?

(A)Incoming Email
(B)Outgoing Email
(C)CD Roms
(D)Websites
show answer

Question: 53

What is the fullform of W3C?

(A)World Wide Web Consortium
(B)World Wide Web Company
(C)World Wide Web Center
(D)World Wide Web Command
show answer

Question: 54

Which among the following is used for removing a softwareThe computer programme which contains the instructions to make the hardware work are called software. There are two primary software categories viz. Operating Systems or ..... bug / defect which is available for free of cost from the software provider?

(A)Version
(B)Update
(C)Help
(D)Patch
show answer

Question: 55

What is the name of the proposed software application that would allow users of automated teller machines (ATMs) to alert the police of a forced cash withdrawal by entering their personal identification number (PIN) in reverse order?

(A)ATM SafetyPIN
(B)ATM SafetyPro
(C)ATM SafetyCode
(D)ATM SafetySign
show answer

Question: 56

In the MICR Code Line Structure what do represent the first three digits of Sort field number consisting of nine digits?

(A)City
(B)Bank
(C)Branch
(D)Account Type
show answer

Question: 57

Most of the internet banking sites provide which of the following feature to reduce the risk of keystroke logging for the password entry?

(A)Virtual keyboardThe standard microcomputer keyboard consists of 104 keys arranged in the standard typewriter or QWERTY layout. A separate numeric keypad is at the right side .....
(B)Finger Touching
(C)Touchscreen
(D)ShapeWriter
show answer

Question: 58

ADSL data communications technology uses which of the following for faster data transmission ?

(A)Voiceband modem
(B)Wireless Modem
(C)Copper telephone Lines
(D)Sockets
show answer

Question: 59

While working on Microsoft Word , which among the following is the command for "Undo"?

(A)Cntrl +A
(B)Cntrl +Z
(C)Cntrl +Y
(D)Cntrl +C
show answer

Question: 60

While browsing the internet , which of the following key is used for full screen view?

(A)F3
(B)F5
(C)F11
(D)F9
show answer

Click on the Next Page for More Questions

1 2 3 4 56 7 8 9 10

Bank PO Computer Awareness

Question: 41

One kilobyte has _____?

(A)1000 bytes
(B)128 bytes
(C)1024 bytes
(D)1036 bytes
show answer

Question: 42

Which among the following is correct about 4GL?

(A)A computer brand
(B)A softwareThe computer programme which contains the instructions to make the hardware work are called software. There are two primary software categories viz. Operating Systems or ..... brand
(C)A software program
(D)A programming language
show answer

Question: 43

First microprocessors were used in which of the following?

(A)Computers
(B)Calculators
(C)Telephones
(D)Printers
show answer

Question: 44

Which of the following transforms input data into output data?

(A)Peripherals
(B)RAM
(C)ROM
(D)CPU
show answer

Question: 45

In a computer file systems which among the following is top or first in hierarchy?

(A)root directory
(B)parent directory
(C)home directory
(D) working directory
show answer

Question: 46

What is HTTP 404?

(A)An error message indicating server not found
(B)An error message indicating moved permanently
(C)An error message indicating forbidden
(D)An error message indicating server found
show answer

Question: 47

Core Banking Solutions are developed to perform__?

(A)recording of transactions
(B) passbook maintenance
(C)interest calculations
(D)All of the above
show answer

Question: 48

Which among the following is not a security / privacy risk?

(A)Spam
(B)Hacking
(C)Virus
(D)Phishing
show answer

Question: 49

Now a days Vishing has become a criminal practice of using social engineering over which of the following?

(A)Social networking sites
(B)Mobile Phones
(C)E-mails
(D)Cyber cafés
show answer

Question: 50

When some unidentified / unknown person / firm sends you mail in a trustworthy /lucrative way asking for sensitive banks and online payment information, this is a case of __?

(A)spam
(B)hacking
(C)Phishing
(D)Vishing
show answer

Click on the Next Page for More Questions

1 2 34 45 6 7 8 9 10

Bank PO Computer Awareness

Question: 31

Which among the following are not Objects in Access Database?

(A)Table
(B)Form
(C)Query
(D)Pivot Table
show answer

Question: 32

Which of the following Key is not found in normal computers / laptops?

(A)turn key
(B)alt key
(C)del key
(D)shift key
show answer

Question: 33


(A)analog computer
(B)digital computer
(C)both analog and digital computer
(D)mainframe computer
show answer

Question: 34

Structured programming languages such as C, COBOL and FORTRAN were used in which of the following computers?

(A)First Generation Computers
(B)Second Generation Computers
(C)Third Generation Computers
(D)Fourth Generation Computers
show answer

Question: 35

Which among the following statement is correct ? (More than one options are correct )

(A)Machine Language was developed prior to Assembly Language
(B)Assembly Language Was developed prior to Machine Language
(C)Both Assembly and machine languages were developed together
(D)First generation computers used machine language and second generation computers used assembly language
show answer

Question: 36

Which of the following are called Knowledge Information processing System?

(A)Fourth Generation Computers
(B)Fifth Generation Computers
(C)Laptops
(D)Servers
show answer

Question: 37

What is the correct full form of VLSI?

(A)Very Large Scale Integration
(B)Very large SoftwareThe computer programme which contains the instructions to make the hardware work are called software. There are two primary software categories viz. Operating Systems or ..... Integration
(C)Very large Scale Implementation
(D)Very Large Software Implementation
show answer

Question: 38

Which of the following generation of computers is associated with artificial intelligence?

(A)First
(B)Second
(C)Third
(D)Fifth
show answer

Question: 39

The sixth-generation era (sometimes referred to as the 128-bit era) refers to which of the following? [A]Sixth generation Computers

(A)Sixth generation Computers
(B)Laptops
(C)Super computers
(D)Video game Consoles
show answer

Question: 40

BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which one of the following groups?

(A)ISDN
(B)IRC
(C)ISP
(D)Icons
show answer

Click on the Next Page for More Questions

1 2 34 5 6 7 8 9 10

Bank PO Computer Awareness

Question: 21

What is the full form of ADSL ?

(A)Automatic Digital Subscriber Line
(B)Asymmetric Direct Subscriber Line
(C)Asymmetric Digital Subscriber Line
(D)None of these
show answer

Question: 22

Which among the following key is used for checking grammar and spelling?

(A)F3
(B)F5
(C)F7
(D)None of these
show answer

Question: 23

An Autoresponder is a_______on mail server that automatically replies to e-mails ?

(A)command
(B)softwareThe computer programme which contains the instructions to make the hardware work are called software. There are two primary software categories viz. Operating Systems or .....
(C)program
(D)None of these
show answer

Question: 24

DDL is used to define the structure of a database, including the tables, columns, and data types that it contains. Its full form is ?

(A)Data Definition Language
(B)Data Definition Link
(C)Determination Language.
(D)None of these
show answer

Question: 25

A DSLAM is a device used by Internet Service Providers (ISPs) to route incoming DSL connections to the Internet. What is its correct full form ?

(A)Digital Subscriber Line Access Multiplexer
(B)Digital Subscriber Line Access Multiplier
(C)Digital Service Line Access Multiplexer
(D)None of these
show answer

Question: 26

RUP Stands for "Rational Unified Process." RUP is a software development process from Rational, a division of _______?

(A)Microsoft
(B)IBM
(C)Compaq
(D)None of these
show answer

Question: 27

Which among the following defines web2.0 most precisely ?

(A)A New version of Internet
(B)A Series of technological improvements in World Wide Web
(C)A New labeling of old Softwares improved
(D)None of these
show answer

Question: 28

Microsoft first introduced an operating environmentenvironment named Windows in which year?

(A)1977
(B)1985
(C)1988
(D)None of these
show answer

Question: 29

32 bit operations were introduced for the first time by Microsoft in ________?

(A)windows 95
(B)Windows 3.0
(C)Windows 3.11
(D)None of these
show answer

Question: 30

A GUID is a 128-bit (16 byte) number used by software programs to uniquely identify the location of a data object. What is correct full form?

(A)Graphical User Identifier
(B)Globally Unique Identifier
(C)Globally Unique Internet
(D)None of these
show answer

Click on the Next Page for More Questions

1 23 4 5 6 7 8 9 10

Question: 11

Structured Query Language (SQL) is used in the following ?

(A)Create Databases
(B)Create & Modify Databases
(C)Create, Modify & Query Databases
(D)None of these
show answer

Question:12

A file which has not been altered, compressed, or manipulated in any way by the computer is called?

(A)temp file
(B)raw file
(C)permanent file
(D)None of these
show answer

Question: 13

The word bandwidth is also used to mean ________?

(A)width of the data cable
(B)amount of data transferred
(C)number of the computers on a particular network
(D)None of these
show answer

Question: 14

Which among the following can be called an electronic check ?

(A)Magnetic Stripe Card
(B)Smart Card
(C)Fleet Card
(D)All of them are payment card technologies
show answer

Question: 15

NetBIOS was introduced in 1983 by which company as an improvement to the standard BIOS used by Windows-based computers?

(A)Dell
(B)IBM
(C)Compaq
(D)None of these
show answer

Question: 16

Which among the following can be called an electronic check ?

(A)Debit Card
(B)Smart Card
(C)Credit Card
(D)None of these
show answer

Question: 17

Which of the following was used in programming the first computers?

(A)Object code
(B)Source Code
(C)Machine Language
(D)Assembly Language
show answer

Question: 18

Any piece of data can be returned in a constant time, regardless of its physical location and whether or not it is related to the previous piece of data using which of the following ?

(A)CPU
(B)RAM
(C)ROM
(D)Network Interface Card
show answer

Question: 19

Which Microsoft-based technology was built to link desktop applications to the World Wide Web?

(A)Active Channel
(B)Active Desktop
(C)ActiveX
(D)None of these
show answer

Question: 20

What is the name of the digital circuit that performs arithmetic and logical operations in computers?

(A)Arithmetic Logic Unit
(B)Digital comparator
(C)Multiplexer
(D)None of these
show answer

Click on the Next Page for More Questions

12 3 4 5 6 7 8 9 10

Bank PO Computer Awareness

Question: 1

Which among the following is responsible for allocating IP addresses and managing the domain name system.?

(A)Domain name warehousing.
(B)Internet Corporation For Assigned Names and Numbers
(C)Internet Assigned Numbers Authority
(D)None of these
show answer

Question: 2

The performance of a hard drive or other storage device , meaning how long it takes to locate a file is called ?

(A)Response Time
(B)Access Time
(C)Quick Time
(D)None of these
show answer

Question: 3

Alerts are mostly appear in ______?

(A)Check Box
(B)Combo Box
(C)Dialog Box
(D)None of these
show answer

Question: 4

Which of the following was used in first generation computers?

(A)Machine Language
(B)High Language
(C)Assembly Language
(D)None of these
show answer

Question: 5

A unit of data storage that equals 2 to the 70th power is called?

(A)Zebibyte
(B)Yottabite
(C)Yobibite
(D)None of these
show answer

Question: 6

What is used in most programs that is a part of a program and guides the user through certain steps?

(A)
(B)Wizard
(C)Wiki
(D)None of these
show answer

Question: 7

A generic name for Intel processors released after the original 8086 processor is ______ ?

(A)Pentium
(B)x86
(C)Pentium 286
(D)None of these
show answer

Question: 8

A network that is connected to the Internet, but uses encryption to scramble all the data sent through the Internet is called ?

(A)My network
(B)Virtual private Network
(C)Social Network
(D)None of these
show answer

Question: 9

V-RAM is used for access of the following ?

(A)Video & Graphics
(B)Text & Images
(C)programs
(D)None of these
show answer

Question: 10

Panther (10.3), Jaguar (10.2), Puma (10.1), and Cheetah (10.0) are examples of _______?

(A)Windows OS
(B)Mac OS
(C)Open Operating Systems
(D)None of these
show answer

Click on the Next Page for More Questions>

1 2 3 4 5 6 7 8 9 10

Share this post

Related Posts Plugin for WordPress, Blogger...