Computer Quest

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 29

1) SWIFT owns responsibility for transmission:

a) between regional processors only


b) between regional processors and member banks
c) between member banks only
d) all the above
e) none of the above

2) The SWIFT security control to prevent automatic changes during transmission is


called:
a) encryption
b) checksum
c) decryption
d) key authentication
e) none of the above

3) The SWIFT security control to ensure data confidentiality is called:


a) encryption
b) checksum
c) decryption
d) key authentication
e) none of the above

4) ____________ permits payments to be made at the merchant establishment through


electronic funds transfer (EFT):
a) Point of Sale
b) Bank ATM
c) FEDWIRE
d) BANKWIRE
e) None of the above

5) Which of the following is correct regarding pair of keys used in an electronic


signature?
a) private key is used by a person to sign and public key is used by relying party
to verify the private key
b) public key is used by a person to sign and private key is used by relying party to
verify the public key
c) private key and public key are used by a person to sign and to verify the private key
by the same persons
d) all the above
e) none of the above

6) The debit payment system that works on the principle of multiple debits and a single
credit:
a) debit clearing
b) electronic debit clearing
c) electronic clearing
d) electronic clearing service
e) none of the above

7) The electronic system through which a company or a mutual fund can make payment
of dividend to a large number of shareholders or unit holders:
a) MICR
b) Truncation
c) Debit Clearing System
d) Credit Clearing System
e) None of the above

8) _____________ is a mechanism under which an account holder with a bank can


authorise an ECS user to recover an amount at a prescribed frequency by raising a debit in his
account:
a) NEFT
b) RTGS
c) ECS-Debit
d) ECS-Credit
e) None of the above

9) The transaction limit under mobile banking is Rs.________ per customer for
transactions involving purchase of goods and services and transfer of funds:
a) 50000
b) 25000
c) 10000
d) 5000
e) Bank's discretion

10) The sub-section (5) of the Section 25 of the Payment and Settlement Systems Act,
2007 provides for _________ of electronic funds transfer instruction, or both for dishonour of
such electronic funds transfer instructions.
a) imprisonment of 2 years and fine twice the amount
b) imprisonment of 1 year and fine twice the amount
c) imprisonment of 2 years and fine equal to the amount
d) imprisonment of 1 year and fine equal to the amount
e) imprisonment of 2 years and fine thrice the amount

1) Which of the following is not an electronic funds transfer system?


a) Electronic Clearing Services
b) National Electronic Fund Transfer
c) Real Time Gross Settlement
d) Electronic Fund Transfer
e) None of the above
2) Under NEFT, once a request for transfer of funds is received from a customer, the
remitter bank prepares SFMS, which stands for:
a) Standard Financial Monitoring System
b) Standard Financial Messaging System
c) Structured Financial Messaging System
d) Structured Financial Monitoring System
e) None of the above

3) Under NEFT, if a message is not returned uneffected _________, it is treated to have


been completed and credit afforded to the beneficiary's account by the beneficiary branch
a) before the next settlement day
b) before the next day
c) before the next business day
d) before the next banking day
e) none of the above

4) Which of the following is not correct regarding RTGS in India?


a) It is managed by RBI as a settlement authority
b) It was established in the year 2004
c) It is a batch settlement system
d) All the above
e) None of the above

5) RBI's VSAT network called Indian Financial Network (INFINET) has been set up at
Hyderabad on recommendations of:
a) TN Anantharam Iyer Committee
b) 2nd Rangarajan Committee
c) Saraf Committee
d) Shere Committee
e) None of the above

6) Which of the following services can be offered by banks through internet?


a) Banks can sell their products through specially designed web pages
b) Banks can offer account opening facilities to NRIs
c) Interactive feedback forms can be designed and used
d) All the above
e) None of the above

7) SWIFT is owned by which of the following?


a) US Federal Bank
b) European Central Bank
c) Bank for International Settlements
d) Member banks
e) None of the above

8) Which of the following is not correct regarding SWIFT?


a) It is established under Belgian Law
b) It is a public limited company
c) Its headquarters is in Brussels
d) Its major role is transmission of financial messages
e) None of the above

9) Which of the following is not a feature of SWIFT?


a) It is operational on 24 x 7 basis
b) Financial messages are transmitted all over the world
c) All message formats are standardised
d) SWIFT does not assume any financial liability
e) None of the above

10) In India, SWIFT is operating for quite long. Which of the following is correct?
a) Regional Processor is at Mumbai
b) All public sector banks are its members
c) Banks are connected to Regional Processor
d) All the above
e) None of the above

1) There are a number of slots in the ATM for various purposes. Which of the following
is not one such slot?
a) deposit slot
b) cash dispenser
c) card reader
d) PIN
e) none of the above

2) Which of the following is correct in the context of PIN?


a) PIN stands for personal information number
b) PIN is similar to a password
c) PIN is not inserted on the ATM card
d) all the above
e) none of the above

3) The smart card is similar to an ATM card or Credit card:


a) with a loaded value
b) with an integrated circuit (IC)
c) with a charging facility
d) all the above
e) none of the above

4) Electronic signature is recognised equal to a handwritten signature as per provisions


of
a) NI Act 1881
b) Information Technology Act 2000
c) Indian Evidence Act
d) Banking Regulation Act
e) None of the above

5) _________________ is a smart card that contains electronic money. It is sometimes


called the electronic wallet or the stored value card (SVC)
a) electronic purse
b) electronic cash
c) electronic card
d) all the above
e) none of the above

6) Where funds are loaded in a card to use these as cash, in case of need, it is called:
a) smart card
b) electronic cheque
c) electronic purse
d) electronic cash
e) none of the above

7) When the card holder authorises payment by typing his PIN and his bank account is
debited and account of merchant establishment (point of sale) is credited, it is called:
a) electronic token
b) electronic cheque
c) electronic purse
d) electronic cash
e) none of the above

8) A bank allows its customers to effect banking transactions through its website such as
transfer of funds. It is called:
a) base level service
b) simple transactional website
c) fully transactional website
d) any of the above
e) none of the above

9) After cheque truncation, the paper cheque is kept in the custody of:
a) bank or clearing house that truncated the cheque
b) paying bank
c) collecting bank
d) clearing house
e) none of the above

10) With a view to authenticate the electronic image of the truncated cheque, the bank or
clearing house that truncates the cheque:
a) can send a separate confirmation in writing
b) can send an email
c) can attach electronic signature
d) any of the above
e) none of the above

1) There are _____ parties to an electronic signature, that include:


a) 2, sender & receiver
b) 2, sender & certification authority
c) 3, sender receiver & certification authority
d) 2, receiver & certification authority
e) none of the above

2) With a view to ensure that the user should not be able to misuse the system what
provision can be there as part of computer system security?
a) instructions can be issued not to report outside prescribed hours
b) someone should guard the computer system at all times
c) restrictions on users may be provided in the system
d) all the above
e) none of the above

3) Banking records in an electronic form shall be treated as _________ records under the
provisions of ________ Act:
a) valid, NI Act
b) invalid, BR Act
c) valid, IT Act 2000
d) valid, IT Act 1961
e) none of the above

4) What is the minimum time period for which the electronic records are to be
preserved?
a) till they are available in a computer system
b) as per rules for physical records unless modified
c) there is no need for maintenance of such records
d) all the above
e) none of the above

5) Which of the following actions of a person are not to be included as part of the legal
definition of computer crime?
a) damage to a computer system
b) disruption to a network of computers
c) providing assistance to another person to get access to a computer system
d) all the above
e) none of the above
6) Local Area Network is the computer network. Which of the following statements
explains it better?
a) the network that links computers and peripherals within a municipal area
b) the network that links computers and peripherals within a localised area
c) the network that links computers and peripherals within a state area
d) all the above
e) none of the above

7) In a local area network, each independent computer system (i.e. terminal linked to
server) is called:
a) sub-LAN
b) server
c) workstation or node
d) any of the above
e) none of the above

8) Which of the following relates to helping in recovering from failures in a network


system?
a) work-station
b) server
c) disk mirroring
d) nodes
e) none of the above

9) In a core banking system (a) the branches are linked to central server (b) transactions
are done in the branch server and controlled by central server (c) the customer is offered any
time anywhere banking facilities
a) a to c - all correct
b) only a and b correct
c) only a and c correct
d) only b and c correct
e) a to c - all incorrect

10) The setting up of ATM was recommended by which of the following committee?
a) Narasimham Committee
b) Saraf Committee
c) Rangarajan Committee
d) Shere Committee
e) None of the above

1) One Yobibyte = 1024 _____


a) Petabytes
b) Zebibytes
c) Yottabytes
d) Exabytes
e) None of the above
2) The art and science of keeping files and messages secured is called:
a) encryption
b) decryption
c) pass phrase
d) cryptography
e) none of the above

3) The process of retrieval of plain text from the coded (ciphered) message is known as:
a) encryption
b) decryption
c) passphrase
d) cryptography
e) none of the above

4) A string of characters that is used to mathematically encode the message to ensure


that it can be read only by someone in possession of that string or another related string, is
called:
a) encryption
b) decryption
c) key
d) password
e) none of the above

5) Which of the following keys is kept secret by the owner of the key as it is used to
sign?
a) public key
b) private key
c) security key
d) general key
e) none of the above

6) The recipient of a digitally signed message can verify the authenticity of the message
by use of which of the following key?
a) sender's private key
b) sender's public key
c) receiver's private key
d) receiver's public key
e) none of the above

7) The pair of keys that is used in case of electronic signature is called:


a) sender-receiver key
b) public-private key
c) encryption-decryption key
d) validation-authentication key
e) none of the above
8) An electronic database of certificates, the equivalent of digital Yellow Pages is called:
a) certificates chest
b) certificates depositor
c) repository
d) certificate warehouse
e) none of the above

9) The process of conversion of a variable length message into a fixed length key is
called:
a) conversion
b) hashing
c) key fixation
d) decryption
e) none of the above

10) Disk mirroring stands for which of the following?


a) duplication of CD-ROM
b) duplication from hard drives
c) duplication of data from one hard disk to another hard disk
d) all the above
e) none of the above
1) A system in which the collecting bank captures the electronic image of a cheque and
sends the electronic image to the paying bank, for collection, is called:
a) Cheque Electronic Clearing
b) Electronic Cheque
c) Truncation of cheques / instruments
d) Image Transfer Network
e) None of the above

2) A settlement system in which the processing and final payment of funds transfer
instructions takes place continuously, is called:
a) debit clearing system
b) credit clearing system
c) national clearing system
d) real time gross settlement
e) None of the above

3) The pair of keys used in electronic signature / digital signature is called:


a) Private Key and Master Key
b) Public Key and Master Key
c) Public Key and Private Key
d) Any of the above
e) None of the above
4) Structured Financial Messaging System (SFMS) is _______________ system on the
line of SWIFT
a) a data messaging
b) an electronic data interchange
c) an electronic exchange of data
d) any of the above
e) none of the above

5) What kind of message can be exchanged on SFMS?


a) Financial messages of all kinds
b) Coded messages of any kind
c) Structured message in conformity with published standards
d) Any of the above
e) None of the above

6) Under SFMS, the confidentiality of the messages is protected by way of


a) Coding
b) Decoding
c) Decryption
d) Encryption
e) None of the above

7) The mechanism where the buyer can purchase goods and services without actually
making the payment immediately is called
a) Line of Credit
b) Debit Card
c) Credit Card
d) Any of the above
e) None of the above

8) Which of the following is the reason for email being so popular?


a) messages can be sent as per convenience of the user
b) delivery of the message is confirmed and quickly delivered
c) message can be read as per convenience of the receiver and forwarded
d) All the above
e) None of the above
4000

9) If a computer is used to store confidential information, to ensure data security, which


of the following be used?
a) Close Circuit TV
b) Encryption
c) Buried Line Sensors
d) Locking and Guarding
e) None of the above
10) A system that is used to restrict the outside intrusion to access a computer system is
called:
a) encryption
b) firewall
c) lures or honeypots
d) Any of the above
e) None of the above

1) In which of the following, the data is collected during a specific period and then
processed?
a) real time system
b) online system
c) batch system
d) centralised processing system
e) distributed data system

2) The computer system is controlled by a sequence of instructions that are called:


a) computer software
b) computer program
c) computer input device
d) computer output device
e) operating system

3) The computer based network which connects the computers over a local area is
called:
a) Local area connection
b) Local area network
c) Wide area network
d) Metro area network
e) None of the above

4) The system that has a very high frequency radio signal to transmit data through space
is known as:
a) Optical Fibre
b) Terrestrial Cables
c) Microwave system
d) Coaxial cables
e) Modem

5) IDRBT stands for which of the following:


a) Institute for Development and Research in Banking Technology
b) Institute for Development and Research in Business Technology
c) Institution of Development and Research in Banking Technology
d) Institute for Development of Rural Banking Technology
e) None of the above
6) The term ISP means
a) Internal Service Provision
b) Internet Service Process
c) Internet Service Provider
d) Interesting Service Process
e) International Society of People

7) What purpose is served in a computer by the screen saver?


a) Stops the computer
b) Stops burning of the computer
c) Stops running of a computer program
d) Gives good look to the computer system
e) All the above

8) Which of the following benefit the CBS system does not offer to a bank?
a) Enhanced customer service level
b) Lower transaction cost
c) 24 hour banking
d) All the above
e) None of the above

9) In a MICR cheque, which of the following code does not match the description?
a) first 6-digit code - cheque number
b) central 9-digit code - city, bank and branch code
c) last 2-digit code - transaction code such as saving or current account
d) All of the above
e) None of the above

10) The processing machine that processes the cheques at high speed in the clearing house
is called:
a) Processor
b) Reader-cum-sorter
c) Encoder
d) All of the above
e) None of the above

1) The term RAM stands for which of the following?


a) Read able Memory
b) Read access Memory
c) Readable accessing Memory
d) Read & access Memory
e) Random access Memory

2) For customer transactions in RTGS system:


a) giving beneficiary account number is optional
b) giving beneficiary account number is compulsory
c) transactions without beneficiary account number can be accepted at the risk of the
beneficiary
d) transactions without beneficiary account number can be accepted if beneficiary
name is available
e) None of the above

3) The program that takes a file of source code written in a high level programming
language to convert it into object code:
a) joystick
b) light pen
c) compiler
d) touch screen
e) bar code reader

4) Which among the following is part of the National Payment System in India?
a) RTGS & SWIFT
b) RTGS & NEFT
c) NEFT & SWIFT
d) SWIFT & CTS
e) None of the above

5) For violation of procedures of RTGS, RBI can impose penalty on banks under
provisions of which of the following:
a) Section 47, Banking Regulation Act
b) Sec 45-D, RBI Act
c) Section 30, Payment & Settlement Act 2007
d) Information Technology Act, 2000
e) None of the above

6) The program that initialises the machines to make it operational is covered under the
category of
a) System software
b) System hardware
c) Application software
d) Non-utility software
e) b and d both

7) The term ANSI stands for


a) American National Standards Institute
b) American Networking Standards Institute
c) Asian National Standard Institute
d) Afro-Asian Networking Standard Institute
e) a and d above
8) The computer output that is printed on a paper is called:
a) soft copy
b) hard copy
c) electronic copy
d) text copy
e) a and c

9) The term WWW is used for which of the following:


a) World Wide Web
b) World Wise Web
c) Web World Wide
d) Wide World Web
e) Wild World Web

10) Which of the following better describes the term internet?


a) a network of stand alone computers
b) a network of servers
c) a network of networks
d) a network of worldwide computers
e) all the above

1) The software that is used for a centralised environment in banking operations is called
a) Central Branch Solutions
b) Core Banking Situations
c) Centralised Banking Solutions
d) Centralised Business Solutions
e) a and c

2) Which of the following kinds of environment is provided through Centralised


Banking Solution software?
a) any time banking
b) anywhere banking
c) bank customer instead of branch customer
d) a and b
e) a to c

3) The part of the computer that makes use of primary memory:


a) Storage Unit
b) Central Processing Unit
c) Output devices
d) Computer user
e) All the above
4) Which of the following is the instruction of payment called Plastic Money?
a) Identity Card
b) Plastic Card
c) Debit Card
d) Greeting Card
e) Banker's Cheque

5) What is the maximum no. of free transactions including balance enquiry, by a


customer by using ATM of other Bank?
a) 2 per month
b) 3 per month
c) 5 per month
d) 10 per month
e) No such limit

6) Through which of the following systems, the customer could leave the message for
the concerned desk which the person handling the desk could provide later on:
a) Telebanking
b) Internet Banking
c) Voice Mail facility
d) ATM facility
e) Mobile Banking

7) The term EFT means


a) Electronic Foreign Transfer
b) Electronic Financial Transfer
c) Electronic Funds Transfer
d) Electrical Funds Transfer
e) None of the above

8) The term SWIFT stands for which of the following?


a) Society for world-over international financial transfers
b) Society for world-wide interbank financial transfers
c) Society for world-wide interbank financial telecommunication
d) Society for worst international financial terrorism
e) Social world-wide interesting financial telecommunication

9) 1024 bytes are equal to


a) 1 kilobyte
b) 1 megabyte
c) 1 gigabyte
d) 1 terabyte
e) 1 petabyte

10) 1024 terabytes are equal to


a) 1 kilobyte
b) 1 megabyte
c) 1 gigabyte
d) 1 terabyte
e) 1 petabyte

1) Select the smallest memory size


a) Terabyte
b) Gigabyte
c) Kilobyte
d) Megabyte
e) Petabyte

2) Ctrl, Shift and Alt are called _________________ Keys


a) Modifier
b) Function
c) Alphanumeric
d) Adjustment
e) Hot

3) If a word typed is not in MS Word’s dictionary, a ____________ wavy underline


appears below the word
a) red
b) green
c) blue
d) black
e) None of these

4) ____________Software allows users to perform calculations on rows and columns of


data
a) Word processing
b) Presentation graphics
c) Database Management Systems
d) Electronic Spreadsheet
e) None of these

5) The horizontal and vertical lines on a worksheet are called


a) cells
b) sheets
c) block lines
d) gridlines
e) None of these
6) To delete an incorrect character in a document, ____________ to erase to the right of
the insertion point (cursor)
a) press the left mouse key
b) double-click the right mouse key
c) press the BACKSPACE key
d) press the delete key
e) None of these

7) The operating system does all of the following EXCEPT


a) provide a way for the user to interact with the computer
b) manage the central processing unit (CPU)
c) manage memory and storage
d) enable users to perform a specific task such as document editing
e) None of the above

8) ____________ are lists of commands that appear on the screen


a) GUIs
b) Icons
c) Menus
d) Windows
e) None of the above

9) Verification of a login name and password is known as


a) configuration
b) accessibility
c) authentication
d) logging in
e) None of the above

10) The computer's contents are organised in a hierarchical structure of directories that
include all of the following EXCEPT
a) files
b) folders
c) drives
d) systems
e) None of the above

1) Servers are computers that provide resources to other computers connected to a


a) network
b) mainframe
c) supercomputer
d) client
e) None of the above
2) The difference between people with access to computers and the Internet and those
without this access is known as the
a) digital divide
b) Internet divide
c) Web divide
d) broadband divide
e) None of the above

3) One byte consists of ________ bits


a) 8
b) 2
c) 4
d) 16
e) None of the above

4) The binary language consists of ____________ digit(s).


a) 8
b) 2
c) 1,000
d) 1
e) None of the above

5) All of these are suggestions for safe computing EXCEPT


a) don’t borrow disks from other people
b) open all e-mail messages but open them slowly
c) download shareware and freeware with caution
d) disinfect your system
e) None of the above

6) What is the most common tool used to restrict access to a computer system?
a) User logins
b) Passwords
c) Computer keys
d) Access-control software
e) None of the above

7) First generation computer systems used


a) Transistors
b) Vacuum tubes
c) Magnetic cores
d) Silicon chips
e) None of the above

8) Transistors are associated with which computer system?


a) First generation
b) Fifth generation
c) Second generation
d) Third generation
e) Fourth generation

9) 18. Charles Babbage invented


a) ENIAC
b) Difference Engine
c) Electronic Computer
d) Punched Card
e) None of the above

10) A terabyte comprises of


a) 1024 GB
b) 1024 KB
c) 1024 MB
d) 1024 Bytes
e) None of the above

1) __________ tags, when placed on an animal, can be used to track in a database all of
the animal's movements:
a) POS
b) RFID
c) PPS
d) GPS
e) None of the above

2) Surgeons can perform delicate operations by manipulating devices through computers


instead of manually. This technology is known as:
a) Robotics
b) Computer forensics
c) Simulation
d) Forecasting
e) None of the above

3) Computers gather data, which means that they allow users to ____________ data
a) present
b) input
c) output
d) store
e) None of the above

4) Computers use the ____________ language to process data


a) processing
b) kilobyte
c) binary
d) representational
e) None of the above

5) The term bit is short for


a) Megabyte
b) Binary language
c) Binary digit
d) Binary number
e) None of the above

6) A string of eight 0s and 1s is called a


a) megabyte
b) byte
c) kilobyte
d) gigabyte
e) None of the above

7) All of the following are examples of input devices EXCEPT


a) Scanner
b) Mouse
c) Keyboard
d) Printer
e) None of the above

8) The CPU and memory are located on the


a) expansion board
b) motherboard
c) storage device
d) output device
e) None of the above

9) Word processing, spreadsheet and photo-editing are examples of


a) application software
b) system software
c) operating system software
d) platform software
e) None of the above

10) System software is the set of programs that enables your computer's hardware devices
and ___________ software to work together
a) management
b) processing
c) utility
d) application
e) None of the above
1) What is the function of Recycle Bin?
a) Store deleted file
b) Store temporary file
c) Store corrupted file
d) Store Document file
e) None of these

2) Log Out means


a) Shut down the computer
b) Come out from the package
c) Switch off mains power supply to the computer
d) Enter the ID and Password
e) All the above

3) Which device cannot be shared in network ?


a) Floppy
b) Keyboard
c) Computer
d) Printer
e) None of these

4) What is the name of excel files ?


a) Workbook
b) Worksheet
c) Spreadsheet
d) Spread book
e) None of these

5) Synonym can be reviewed with


a) Spelling and grammar
b) Thesaurus
c) Both a and b
d) Synonym viewer
e) None of these

6) CPU stands for :


a) Computer Processing Unit
b) Central Processing Unit
c) Both a and b
d) Communication Processing Unit
e) None of these

7) PARAM is an example of:


a) Super Computer
b) PC
c) Laptop
d) PDA
e) None of these

8) GUI stands for :


a) Graphical User Interface
b) Graph Use Interface
c) Graphical Universal Interface
d) Graphical User Interference
e) None of these

9) Microsoft Office is
a) Shareware
b) Public domain software
c) Open-source software
d) A vertical market application
e) An application suite

10) The blinking symbol on the computer screen is called the


a) Mouse
b) Logo
c) Hand
d) Palm
e) Cursor

1) Which of the following can be used to select the entire document?


a) CTRL + A
b) ALT + F5
c) SHIFT + A
d) CTRL + K
e) CTRL + H

2) .......... are attempts by individuals to obtain confidential information from you by


falsifying their identity
a) Phishing
b) Computer viruses
c) Spyware scams
d) Viruses
e) None of the above

3) To instruct Word to fit the width of a column to the contents of a table automatically,
click the ..... button and then point to AutoFit Contents.
a) Fit to Form
b) Format
c) Autosize
d) Contents
e) AutoFit

4) Why is it unethical to share copyrighted files with your friends?


a) It is not unethical, because it is legal.
b) It is unethical because the files are being given for free.
c) Sharing copyrighted files without permission breaks copyright laws.
d) It is not unethical because the files are being given for free.
e) It is not unethical-anyone can access a computer

5) Reusable optical storage will typically have the acronym-


a) CD
b) DVD
c) ROM
d) RW
e) ROS

6) To access properties of an object, the mouse technique to use is-


a) dragging
b) dropping
c) right-clicking
d) shift-clicking
e) None of these

7) To change selected text to all capital letters, click the Change Case button, then click
a) UPPERCASE
b) UPPER ALL
c) CAPS LOCK
d) Lock Upper
e) Large Size

8) The basic unit of a worksheet into which you enter data in Excel is called a
a) tab
b) cell
c) box
d) range
e) None of these

9) The process of transferring files from the Internet to your computer is called
a) downloading
b) uploading
c) FTP
d) JPEG
e) downsizing

10) Help Menu is available at which button?


a) End
b) Start
c) Turnoff
d) Restart
e) Reboot

1) When you enter text in a cell in Excel, it also appears in which of the following?
a) Status bar
b) Formula bar
c) Row heading
d) Name box
e) None of these

2) ______ appear at the bottom of the Excel Window.


a) Sheet tabs
b) Name Box
c) Formula bar
d) Title bar
e) None of these

3) Which is not a basic function of a computer?


a) Store data
b) Accept input
c) Process data
d) Copy text
e) Accept and process data

4) In Word, the feature that automatically detects common errors is called


a) Autocorrect
b) Autograph
c) Spelling and Grammar
d) Go to
e) Thesaurus

5) A computer system that is old and perhaps not satisfactory is referred to as a(n)
a) Ancient system
b) Historical system
c) Age old system
d) Legacy system
e) Legal System
6) Which of the following is not a binary number?
a) 001
b) 101
c) 202
d) 110
e) 011

7) By viewing the properties of the local hard disk of a computer, the user can find out
a) the amount of space that has been used up and the remaining free space on the
disk
b) the name of the user viewing the properties of the disk
c) nothing useful to the user
d) the number of programs available in the computer
e) None of these

8) Pre-defined and built-in formulas in Excel are known as


a) Autosheets
b) Diagrams
c) Charts
d) Tables
e) Functions

9) The keyboard shortcut to centralise the selected text in Word is


a) Ctrl + Esc
b) Ctrl + C
c) Alt + C
d) There is no keyboard shortcut for this operation
e) Ctrl + E

10) The operation of combining two cells into a single cell in Excel is referred to as
a) join cells
b) merge cells
c) merge table
d) join table
e) None of these

1) Which of the following can be used to store a large number of files in a small amount
of storage space?
a) File adjustment
b) File copying
c) File reading
d) File compatibility
e) File compression
2) Spell Check will find errors in which of the following?
a) Today is a rainy day
b) Today is a rainy a day
c) Is a rainy
d) Rainy today a day
e) None of the above

3) In Excel, when the contents and attributes of a cell or range of cells have to be erased
using the menu, the user must
a) select the Cells. choose Edit. and select Clear, then All
b) select the Cells. and click Delete on the keyboard
c) select the Cells. choose Tools. and select Clear. then Formats
d) select the Cells. choose Tools. and select Formula Audit. then Delete
e) None of the above

4) The computer abbreviation KB usually means


a) Key Block
b) Kernel Boot
c) Kilo Byte
d) Kit Bit
e) None of these

5) Which of the following is the hardware and not the software?


a) Excel
b) Printer driver
c) Operating system
d) Powerpoint
e) Control Unit

6) In Word, which menu would the user select to print a document?


a) Tools
b) File
c) View
d) Insert
e) None of these

7) The common name for a modulator-demodulator is


a) modem
b) joiner
c) networker
d) connector
e) demod

8) What do you see when you click the right mouse button?
a) The same effect as the left click
b) A special menu
c) No effect
d) A mouse cannot be right clicked
e) Computer goes to sleep mode

9) The Core Banking software used by our bank is called:-


a) Pinnacle
b) Finacle
c) B@ncs24
d) Solaris
e) None of the above

10) The Unique Customer Identification Number consists of digits.


a) 12 numbers
b) 2 alphabets and 6 digits
c) 10 numbers
d) 15 digits
e) None of the above.

1) Match the following: <br> 1) F7 ----------a) Signature verification <br> 2) F9 ----------


b) Account details <br> 3) F10----------c) Customer details
a) 1-a, 2-b, 3-c
b) 1-b, 2-c, 3-a
c) 1-c, 2-b, 3-a
d) 1-a, 2-c, 3-b
e) 1-c, 2-a, 3-b

2) Nomination is not done for this account message is displayed in which of the
following keys?
a) F9
b) F7
c) F10
d) F8
e) None of the above

3) Contacts option in Centmail is used to


a) create contacts
b) create group
c) create reminder
d) invite appointment
e) All the above

4) Which of the following key populates the Mobile Number & PAN of customer in the
screen when account number is entered:
a) F9
b) F7
c) F10
d) F8
e) None of the above

5) Wherever networks are not possible, our bank has gone for satellite connections
otherwise called as_____
a) WINSAT
b) VSAT
c) SAT
d) VAT
e) TAT

6) The processing of loan proposal has been recently computerised and the package for it
is
a) SAFE
b) Lending Automation solutions (LAS)
c) ALPS-Automated Lending Processing System
d) Lending Automation Processing System (LAPS)
e) None of the above

7) Mouse in a computer is ______ device


a) Input
b) Output
c) Control
d) Slow
e) All the above

8) Our Bank has an Anti-Virus solution from ___________ Company


a) Mcafee
b) Avira
c) Symantec
d) Norton
e) Microsoft

9) Caps Lock key in Key Board is used for


a) Lock the key board
b) Toggle key for lower/upper case of English Alphabet
c) Capturing the print on the screen
d) Control the locking system of computer
e) All the above

10) In a branch, UPS is used to Supply Electric Power to


a) Computers
b) Lights
c) Fans
d) Mobile Chargers
e) All the above

You might also like