51. As
per RBI latest instructions to the banks, banks have to ensure that CTS
compliant cheque bokks are issued to all customers across all locations latest
by:
(a) 31.03.2012 (b) 30.06.2012 (c)
30.09.2012
(d)
31.03.2013 (e) 31.12.2012
52. In
a network, the computer that stores the files and process the data is called:
(a) Server (b)
Terminal (c) Modem (d) All of the above
(e) either (a) or (b)
53. Viruses
are so called because:
(a) They are viruses (b)
They can copy themselves and spread
(c) Both (a) and (b) (d)
None of the above
54. Which
of the following can't spread virus?
(a) An e-mail with attachment (b)
A plain text mail
(c) Downloading files over the web (d)
None of the above
55.
There is a new anti-virus software update available which is downloaded to your
computer
(a) everyday (b) only
in the night
(c) When you next switch on your computer (d) All of the above
56. Numbers
are stored and transmitted inside a computer in:
(a)
Binary form (b) ASCII code form (c) Alphabets form
(d) Numerical form (e) None of
these
57. CPU
capacity can be measured in:
(a) BPS (b) MIPS (c) MHz (d)
MPI (e) None of these
58. MPIS
stands for
(a) Million Instructions Per Second (b)
Million Instructions Per Season (c) Monthly Instructions Per Second (d)
Million Inputs Per Second
59. LAN
speeds are measured in:
(a) BPS (b) KBPS (c) MBPS (d)
MIPS (e) none of these
60 Modem
speeds are measured in:
(a) BPS (b) KBPS (c) MBPS (d)
MIPS (e) none of these
61. BPS
stands for:
(a) Bits Per Second (b)
Bits Per Season (c) Bytes Per
Second
(d) Bits Per System (e)
None of these
62. In cheque processing which of the following I/O techniques have banks traditionally been followed?
(a) OCR (b) MICR (c) Barcode (d) VRT (e) CTS
63. The object
of UPS is:
(a) using for storage (b)
increasing the speed of a computer
(c) Providing backup power (d)
All of the above (e) only (a) and (c) above
64. QWERTY
is used with reference to :
(a) Monitor (b) Printer (c) Keyboard (d) Mouse (e)
All of these
65.
"Zipping" a file means:
(a) Encrypting the message (b)
Compressing the message
(c) Transfer the message (d)
All of the above
66. Integrated
Circuits (IC) chips used in computers are made of:
(a) Gold (b) Silver (c) Silicon (d) Copper (e) Cobalt
67. 16.
What is the name of the Super Computer developed in India?
(a) CRAY (b) PARAM (c) Both (a) and (b) (d) None of the above
68. Pick
the odd man out of the following :(Which is different from others)
(a) Internet (b) Windows (c) Unix (d)
Linux (e) none of these
69. What
is the full form of WWW?
(a) World Wide Web (b)
World With Web
c) Work Wide Web (d)
World Wide Wet (e) None of
these
70. Which
of the following Command is required to reboot the computer?
(a) CTRL+ALT+DEL (b)
CTRL+ALT+TAB
(c) CTRL+ALT+SHIFT (d)
CTRL+SHIFT+DEL (e) none of these
71. Pick
the odd man out of the following :(Which is different from others)
(a) Operating system (b)
Interpreter (c) Compiler
(d) Assembler (e)
none of the above
72. PC
stands for
(a) Practical Computer (b)
Personal Computer (c) Private
Computer (d) Personal Contact (e)
Personal Comprehension
73. The
computer code for interchange of information between terminals is (a) BCDIC (b) BCD (c) ASCII (d) None of the above
74. The
retrieval of information from the computer is called:
(a) Data processing (b)
Input (c) Output (d) All of the above (e) either (b) or (c) above
75. Which
one of the following is NOT a computer language?
(a) MS-Excel (b) BASIC (c) COBOL (d) C++
76. "C"
is
(a) A letter (b) A word (c) A language (d) An alphabet
77. Difference
Engine was invented by:
(a) Charles Babbage (b)
John McCarthy (c) Pascal
(d) Newton (e)
none of these
78.
First generation computer systems used:
(a) Transistors (b)
Vacuum Tubes (c) Both (a) and (b)
(d) None of the above
79. A
byte is made up of
(a) Eight bytes (b) Eight
binary digits (c) Two binary digits
(d) Two decimal points
80. Doing
research by using an on-line database instead of a printed set of similar information offers which of the following advantage(s) ?
(a) More current information (b)
Easier to understand
(c) Better charts (d) None
of the above
81. Software
programs that allow you to legally copy files and give them away at no cost are called :
(a) Time sharing (b) Public
domain (c) Shareware
(d) None of the above
82. The
term used to describe physical components of the system is :
(a) Hardware (b) Input (c) Software (d) None of the above
83.
Which of the following is used to indicate the location on the computer monitor?
(a) Mouse (b)
Cursor (c) Both (a) and (b) (d) None of the above
84. If
you intend designing an invitation card, the computer program suitable for the
purpose will be
(a) MS-Word (b)
Desktop Publishing (c) Simulation
(d) None of the above
85. Which
combination of keys needs to be pressed to make a percent sign?
(a) Shift+2 (b)
Shift+3 (c) Shift+4 (d) Shift+5
86. What
process should be used to recall a document saved previously?
(a) Copy (b) Save (c) Retrieve (d) Enter
87. What
term applies to a collection of related records in a database?
(a) Field (b)
File (c) Both (a) and (b)
(d) None of the above
88. How
are data organized in a spreadsheet?
(a) Rows and Columns (b) Boxes (c) Tables (d)
None of the above
89. Which
of the following mode we use to deliver e-mail ?
(a) Postal (b) Courier (c) Computer (d) Fax (e) None of
these
90. VIRUS
stands for
(a) Vital Information Recourse Under Siege
(b) Vital Information Reason Under Siege
(c) Vital Information Recourse Under System
(d) Virus Information Recourse Under Siege
91. ------
Is known as unauthorized access into others system.
(a) Hacking (b) Encryption (c) Decryption (d)
None of the above
92. Inbuilt
storage device of a computer is referred to as:
(a)
floppy (b) compact disc (c) hard disk (d) any of these (e) none
of these
93. The process of
transforming plaintext data into an unintelligible form such that the original data either
cannot be recovered or cannot be
recovered without using an inverse process is
called:
(a) securitization(b) rematerialisation (c) dematerialization
(d) encryption (e) none of these
94. NEFT stands for:
(a) National Equity Fund Trading (b)
National Electronic Funds Transfer (c) Normal Exchange Fed Trading (d)
National Euro Finance Terminals
(e) none of these
95. Firewall
protects the computer from the risk of:
(a) data mining (b) data duplexing (c)
mother board crash (d) hacking (e)
none of the above
96. The
reporting of currency chest operations is done through:
(a)
INDONET (b) NICNET (c) INET (d)
SWIFT (e) INFINET
97. The committee on technology issues relating to payment systems, cheque
clearing and security settlement was
headed by:
(a)
W.S.saraf (b)
Y.B.Damle (c)
S.S.Tarapore
(d) Dr. C. Rangarajan (e) K.S.Shere
98. The
working group to give recommendations in the area of cheque truncation and e- cheque
was headed by:
(a)
Dr. N.L.Mitra (b) B.D. Narang (c) Dr. Burman (d) Zarir Cama (e) none of these
99. The first
bank in India to launch credit card was:
(a)
SBI (b) Central Bank of India (c) BOB (d)
PNB
(e) Syndicate Bank
100. Star,
Ring and Bus topologies are related to:
(a)
CBS (b) ATM (c) Networking layouts (d)
all of these
(e) none of these
101. The
network topology in which there are bidirectional links between possible mode is:
(a)
Ring (b) Star (c) Tree (d) bus (e)
none of these
102. The
most common method being used by banks to transfer funds from one place to
another is called:
(a)
EDI (b) Fax (c) Internet (d) TT (e) none of
these
103. As
at end-January 2015 the number of branches having NEFT facility was around:
(a) 128155 (b) 55000 (c) 81500 (d)
37,600 (e) 43,700
104. Copy printed through computer printer is
called -----copy.
(a) hard (b) soft (c) paper (d)
ancillary (e) none of the above
105. Route
adopted by large companies for payment of dividends to shareholders is called
(a)ECS Debit (b) RTGS (c)
ECS Credit (d) either (b)
or(c)
(e) either (a) or (c)
106. The
way in which computer devices are interconnected is referred to as:
(a)
modem (b) network (c) LAN (d)
topology (e) either (a) or (c)
(a) Dr. C. Rangarajan (b) Dr K.C.Chakrabarty (c) Dr Bimal Jalan (d) Dr. K.P.Krishnan (e) Dr.
K.G. Karmakar
108. The technique to reveal strategic information stored in data
warehouse is called:
(a) data analysis (b) data processing (c) data search (d)
data mining (e) none of these
109. Full form of WAN is:
(a)
Wide Area Network (b) Widely
Acclaimed Negotiator
(c) Wide Artificial network (d)
Wide Arabic Network (e)none
of these
110. An information system that immediately responds
to the physical systems is called:
(a)
Live system (b) On-line System (c) Off-line system (d) Real time system (e)
none of these
111. MICR
is a cheque clearing technology used by banks. It stands for:
(a)
Magnetised Instruments Clearing Reader (b)
Magnetic Ink Character Reader (c)
Magnetic Ink Character Recognition
(d) Mobile Insulated Character Recognition (e) none of these
112. Digital
signals are converted into analog signals at the transmitting end by: (a)
Digital signature (b) UPS (c) Modem (d)
Multiplexer (e) none of these
113. Stand alone computer
system which is best suited for decision making process involving processing
and analysis of data is also referred to as:
(a) modem (b) work station (c)
node (d) either (a) or (b)
(e) either (b) or (c)
114. Super
computers, main-frame computers and mini computers fall in the category of: (a)
Stand alone computers (b) Multi user
computers (c) LAN (d) WAN (e)
none of these
(a)
B.D.Narang (b) Dr. C.Rangarajan (c) Dr. G.Gopalakrishna (d)
P.Vijayabhaskar (e) Dr. K.C.Chakrabarty
116. Society
for Worldwide Inter-bank Financial Telecommunications (SWIFT) was founded by
-----banks spread over 15 countries.
(a)
123 (b) 512 (c) 102 (d)
239 (e) none of these.
117. The
automated clearing system of UK is called:
(a)
CHIPS (b) CHAPS (c) CHATS (d)
MICE (e) none of these
118. Number
of devices supported by LAN can be maximum:
(a)
7 (b) 12 (c) 100 (d) 1000 (e) 25
119. Device
called modem was invented by:
(a)
Microsoft (b) Apple Computers (c) Intel Corporation d) AT&T Information
Systems (e)
Infosys Technologies
120. Full
form of SPNS is:
(a)
Shared Payment Network System
(b) Synchronized Payment
Network system
(c)
Swift payment Negotiated settlement (d)
Shared Protocol Network System (e)
none of these
121. As the data stored in a
computer is vulnerable to loss, at the end of the day it is generally downloaded
on a CD or floppy. The process is called:
(a)
data storage (b) data transmission (c) backup (d)
RAM (e) none of these
122. A computer system
consists of several devices like CPU, monitor, mouse etc. Together they are
called:
(a)
computer peripherals (b) computer
components (c) computer bits (d)
computer equipments (e) none of the
above
123. Which
of the following is not covered under computer related crimes?
(a)
data spying b) data didling (c) data mining (d) data duplexing (e)
none of these
124. When a number of computers are connected to a CPU
in the same building it is called:
(a) WAN (b) LAN (c) RAM (d)
Off site network (e) none of these
125. Feeding of data into computer system is called
(a)Input (b) output (c) booting (d)
skimming (e) none of these
126. Institute for
Development & Research in Banking Technology has advised all banks to allot IFSC to all their branches
and inform them the same so that IFSC directory can be compiled. IFSC stands for:
(a) International Financial System Code
(b) Indian Financial System Code (c)
Intra bank Financial System Code d) International Financial Synchronizing Code (e) None of these
127. The working group on
Electronic money was headed by:
(a) Damle (b) S.S.tarapore (c) Zarir Cama (d)
Dr. Barman (e) none of these
128. India’s largest wide area
network is:
(a) INDONET (b) NICNET (c)
INET (d) SWIFT (e) none of these
129. In
which of the following topology system, the breakdown of one station can
disable the entire network?
(a)
Star (b) Ring (c) Bus (d)
all of these (e) none of these
130. Starting the computer and loading the files
is called:
(a) processing (b) booting (c)
input (d) output (e) truncation
131. IFSC
consists of a 11 digit code with the first ----- alpha characters representing
the bank, and the last 6 numeric characters representing the branch.
(a) 3 (b)
5 (c)
4 (d)
2 (e)
6
132. As per Information Technology Act, 2000 the
key to verify the source of electronic message, its integrity and
non-repudiation is called:
(a) truncation (b) synchronization (c) encryption
(d) digital signature (e) none of these
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
51
|
C
|
52
|
A
|
53
|
B
|
54
|
B
|
55
|
C
|
56
|
B
|
57
|
B
|
58
|
A
|
59
|
C
|
60
|
A
|
61
|
A
|
62
|
B
|
63
|
C
|
64
|
C
|
65
|
B
|
66
|
C
|
67
|
B
|
68
|
A
|
69
|
A
|
70
|
A
|
71
|
A
|
72
|
B
|
73
|
C
|
74
|
C
|
75
|
A
|
76
|
C
|
77
|
A
|
78
|
B
|
79
|
B
|
80
|
A
|
81
|
B
|
82
|
A
|
83
|
B
|
84
|
B
|
85
|
D
|
86
|
C
|
87
|
B
|
88
|
A
|
89
|
C
|
90
|
A
|
91
|
A
|
92
|
C
|
93
|
D
|
94
|
B
|
95
|
D
|
96
|
E
|
97
|
A
|
98
|
C
|
99
|
B
|
100
|
C
|
101
|
A
|
102
|
A
|
103
|
A
|
104
|
A
|
105
|
C
|
106
|
D
|
107
|
B
|
108
|
D
|
109
|
A
|
110
|
D
|
111
|
C
|
112
|
C
|
113
|
E
|
114
|
B
|
115
|
D
|
116
|
C
|
117
|
D
|
118
|
B
|
119
|
D
|
120
|
A
|
121
|
C
|
122
|
A
|
123
|
C
|
124
|
B
|
125
|
A
|
126
|
B
|
127
|
C
|
128
|
B
|
129
|
B
|
130
|
B
|
131
|
C
|
132
|
D
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|