Solved papers for Banking Computers UIICL AO Exam 12-06-2016

done UIICL AO Exam 12-06-2016

  • question_answer1) Which of the following statements is correct?

    A) www.google.com is the web site address to a popular search engine

    B) www.google.com Is a computer virus

    C) www.google.com is an email address to a computer company

    D) www.google.com is the name of the person who invented the Internet

    E) Other than those given as options

    View Answer play_arrow
  • question_answer2) Which of the following statements is correct?

    A) johndow\[\]yahoo.com is a web site (url)

    B) johndow\[\]yahoo.com is an email address

    C) johndow\[\]yahoo.com is a computer name

    D) johndow\[\]yahoo.com is a robot

    E) johndow\[\]yahoo.com is a web builder

    View Answer play_arrow
  • question_answer3) Files have been moved to the Trash Bin, and the trash bin has been emptied. Which of the following is true of the deleted files?

    A) They are no longer accessible

    B) They can be selected and changed

    C) They appear in light grey shade

    D) They can be retrieved, edited, and saved in a new location

    E) They cannot be selected but can be changed

    View Answer play_arrow
  • question_answer4) You have a spreadsheet under the name "MathResults". You made changes to it and want to save it while maintaining a copy of the original spreadsheet, what do you do?

    A) Click the icon

    B) Click "Save" in the file menu

    C) Click "Save As" in the file menu

    D) Used the shortcut CTRL/S

    E) Use the shortcut CTRL/V

    View Answer play_arrow
  • question_answer5) What is the full form of PDF?

    A) Portable Document Format

    B) Performable Document Format

    C) Portable Deformed Format

    D) Performable Deformed Format

    E) Portable Distributed Format

    View Answer play_arrow
  • question_answer6) ______ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

    A) Operating system

    B) Motherboard

    C) Platform

    D) Application software

    E) Cookies

    View Answer play_arrow
  • question_answer7) Servers are computers that provide access to other computers connected to a

    A) Mainframe

    B) Supercomputer

    C) Network

    D) Client

    E) Workstation

    View Answer play_arrow
  • question_answer8) A ______ is approximately one billion bytes.

    A) bit

    B) kilobyte

    C) gigabyte

    D) megabyte

    E) byte

    View Answer play_arrow
  • question_answer9) URL is an acronym for ________

    A) Uniform Resource Locator

    B) Uniform Resource Link

    C) Unique Resource Link

    D) Unique Resource Locator

    E) Universal Resource Location

    View Answer play_arrow
  • question_answer10) All of the following are examples of real security and privacy risks except

    A) Hackers

    B) Spam

    C) Viruses

    D) Identity theft

    E) Phishing

    View Answer play_arrow
  • question_answer11) The set of instructions that tells the computer what to do is

    A) Softcopy

    B) Software

    C) Hardware

    D) Hardcopy

    E) Softcopy

    View Answer play_arrow
  • question_answer12) The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called

    A) instructions

    B) operating system

    C) application software

    D) system unit

    E) part programming

    View Answer play_arrow
  • question_answer13) The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called

    A) simulation

    B) animation

    C) robotics

    D) computer forensics

    E) cryptography

    View Answer play_arrow
  • question_answer14) Data that are accumulated and processed in group are called

    A) Group Processing

    B) Batch Processing

    C) Time Sharing

    D) Process Planning

    E) Other than those given as Options

    View Answer play_arrow
  • question_answer15) The process of transferring files from a computer on the internet to your computer is called

    A) Uploading

    B) Forwarding

    C) FTP

    D) Downloading

    E) Browsing

    View Answer play_arrow
  • question_answer16) 'Bluetooth' technology allows

    A) satellite communication

    B) wireless communication between equipments

    C) signal transmission on mobile phones only

    D) landline phone to mobile phone communication

    E) data modification on mobile phones only

    View Answer play_arrow
  • question_answer17) Verification of a login name and password is known as

    A) Configuration

    B) Accessibility

    C) Authentication

    D) Logging In

    E) Other than those given as options

    View Answer play_arrow
  • question_answer18) Which of the following is a valid IP address?

    A) 192.168.111.1111

    B) 192.168.1.1

    C) 192.168.900.1

    D) 192.900.168.1

    E) 192.111.111.900

    View Answer play_arrow
  • question_answer19) The basic unit of a worksheet into which you enter data in Excel is called a

    A) cell

    B) table

    C) box

    D) column

    E) row

    View Answer play_arrow
  • question_answer20) Disk Operating System (DOS) was designed to work with which of the following input device?

    A) Mouse

    B) Keyboard

    C) Joystick

    D) Xbox

    E) Printer

    View Answer play_arrow

Study Package

UIICL AO Exam 12-06-2016
  15 10

   



LIMITED OFFER HURRY UP! OFFER AVAILABLE ON ALL MATERIAL TILL TODAY ONLY!

You need to login to perform this action.
You will be redirected in 3 sec spinner

Free
Videos