# Solved papers for Banking Computers UIICL AO Exam 12-06-2016

### done UIICL AO Exam 12-06-2016

• question_answer1) Which of the following statements is correct?

A) www.google.com is the web site address to a popular search engine

B) www.google.com Is a computer virus

D) www.google.com is the name of the person who invented the Internet

E) Other than those given as options

• question_answer2) Which of the following statements is correct?

A) johndowyahoo.com is a web site (url)

B) johndowyahoo.com is an email address

C) johndowyahoo.com is a computer name

D) johndowyahoo.com is a robot

E) johndowyahoo.com is a web builder

• question_answer3) Files have been moved to the Trash Bin, and the trash bin has been emptied. Which of the following is true of the deleted files?

A) They are no longer accessible

B) They can be selected and changed

C) They appear in light grey shade

D) They can be retrieved, edited, and saved in a new location

E) They cannot be selected but can be changed

• question_answer4) You have a spreadsheet under the name "MathResults". You made changes to it and want to save it while maintaining a copy of the original spreadsheet, what do you do?

A) Click the icon

B) Click "Save" in the file menu

C) Click "Save As" in the file menu

D) Used the shortcut CTRL/S

E) Use the shortcut CTRL/V

• question_answer5) What is the full form of PDF?

A) Portable Document Format

B) Performable Document Format

C) Portable Deformed Format

D) Performable Deformed Format

E) Portable Distributed Format

• question_answer6) ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

A) Operating system

B) Motherboard

C) Platform

D) Application software

A) Mainframe

B) Supercomputer

C) Network

D) Client

E) Workstation

• question_answer8) A ______ is approximately one billion bytes.

A) bit

B) kilobyte

C) gigabyte

D) megabyte

E) byte

• question_answer9) URL is an acronym for ________

A) Uniform Resource Locator

D) Unique Resource Locator

E) Universal Resource Location

• question_answer10) All of the following are examples of real security and privacy risks except

A) Hackers

B) Spam

C) Viruses

D) Identity theft

E) Phishing

• question_answer11) The set of instructions that tells the computer what to do is

A) Softcopy

B) Software

C) Hardware

D) Hardcopy

E) Softcopy

• question_answer12) The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called

A) instructions

B) operating system

C) application software

D) system unit

E) part programming

• question_answer13) The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called

A) simulation

B) animation

C) robotics

D) computer forensics

E) cryptography

• question_answer14) Data that are accumulated and processed in group are called

A) Group Processing

B) Batch Processing

C) Time Sharing

D) Process Planning

E) Other than those given as Options

• question_answer15) The process of transferring files from a computer on the internet to your computer is called

B) Forwarding

C) FTP

E) Browsing

A) satellite communication

B) wireless communication between equipments

C) signal transmission on mobile phones only

D) landline phone to mobile phone communication

E) data modification on mobile phones only

A) Configuration

B) Accessibility

C) Authentication

D) Logging In

E) Other than those given as options

A) 192.168.111.1111

B) 192.168.1.1

C) 192.168.900.1

D) 192.900.168.1

E) 192.111.111.900

• question_answer19) The basic unit of a worksheet into which you enter data in Excel is called a

A) cell

B) table

C) box

D) column

E) row

• question_answer20) Disk Operating System (DOS) was designed to work with which of the following input device?

A) Mouse

B) Keyboard

C) Joystick

D) Xbox

E) Printer