Solved papers for Banking Computers Science NIACL Assistent Class-III Cadre Exam Held on 18-01-2015

done NIACL Assistent Class-III Cadre Exam Held on 18-01-2015 Total Questions - 40

  • question_answer1) Main memory of a computer is also known as

    A)
     Primary memory

    B)
     Peripheral memory

    C)
     Secondary memory

    D)
     Tertiary memory

    E)
     Auxiliary memory  

    View Answer play_arrow
  • question_answer2) To what temporary area can you store text and other data, and later paste them to another location?

    A)
     ROM   

    B)
     Floppy

    C)
     Clipboard         

    D)
     CD-ROM

    E)
     The hard disk

    View Answer play_arrow
  • question_answer3) The name a user assigns to a document is called ______

    A)
     Process

    B)
     Data

    C)
     Record 

    D)
     File name

    E)
     Program

    View Answer play_arrow
  • question_answer4) The CPU clock speed is normally expressed in ______        

    A)
     Megahertz        

    B)
     500 MHz

    C)
     Bits per clock tick

    D)
     Bytes per second

    E)
     Ticks per second

    View Answer play_arrow
  • question_answer5) A computer checks the _______of user names and password for a match before granting access to the computer,

    A)
     Network           

    B)
     Backup file

    C)
     System software

    D)
     Data base

    E)
     Website

    View Answer play_arrow
  • question_answer6) The science that attempts to produce machines that display the same type of intelligence that humans do is ______

    A)
     Nano technology

    B)
     Simulation

    C)
     Artificial intelligence

    D)
     Application software

    E)
     Nano science

    View Answer play_arrow
  • question_answer7) Computers use the number system to store data and perform calculations

    A)
     Decimal           

    B)
     tertiary

    C)
     octal               

    D)
     hexadecimal

    E)
     binary

    View Answer play_arrow
  • question_answer8) The term _____ designates equipments that might be added to a computer system to enhance its functionality.

    A)
     Disk pack         

    B)
            Digital device

    C)
     Network device

    D)
            Peripheral device

    E)
     System add-on

    View Answer play_arrow
  • question_answer9) What is the NOT a good practice for password policy?

    A)
     Fixing minimum age of password

    B)
     Giving one time password for every transaction

    C)
     Restriction on password reuse and history

    D)
     Password encryption

    E)
     Allowing change of password only every 2 years.

    View Answer play_arrow
  • question_answer10) It is necessary to install a(n) ______ on a network if we want to share a broadband internet connection.

    A)
     Router   

    B)
     node

    C)
     UPS                

    D)
     server

    E)
     cable

    View Answer play_arrow
  • question_answer11) The program which are as permanent as hardware and stored in ROM is known as

    A)
     Hardware         

    B)
     ROM ware

    C)
     Software          

    D)
     Firmware

    E)
     RAM ware

    View Answer play_arrow
  • question_answer12) RAM in computer memory stands for _______

    A)
     Random origin memory

    B)
     Randomly Added Memory

    C)
     Random Access Memory

    D)
     Random only Memory

    E)
     Read only memory

    View Answer play_arrow
  • question_answer13) What is the process of copying software programs from secondary storage media to the hard disk called?

    A)
     Download        

    B)
     Configuration

    C)
     Upload

    D)
     Installation

    E)
     Storage

    View Answer play_arrow
  • question_answer14) Which of the following TCP/IP protocols is used for transferring file from one machine to another?

    A)
     Telnet  

    B)
     RFC

    C)
     SMTP

    D)
     FTP

    E)
     SMMP

    View Answer play_arrow
  • question_answer15) An integrated circuit is ______

    A)
     Complicated wires connected

    B)
     Hard disks

    C)
     An integrating device

    D)
     A communication device

    E)
     Fabricated on tiny silicon chips

    View Answer play_arrow
  • question_answer16) VIRUS stands for

    A)
     Various Indexed Information under Siege

    B)
     Vital Information Resource under Siege

    C)
     Virus Information Reasons Siege

    D)
     Vital Information Reason under Siege

    E)
     Vital Information resource Under System

    View Answer play_arrow
  • question_answer17) Unauthorized access into other system is known as _______

    A)
     Retrieving

    B)
     Decryption

    C)
     Hacking           

    D)
     Sharing

    E)
     Encryption

    View Answer play_arrow
  • question_answer18) The code for Web Page is written using _____

    A)
     A fifth generation language

    B)
     Win zip

    C)
     Hypertext Mark-up Language

    D)
     Peripherals

    E)
     URL

    View Answer play_arrow
  • question_answer19) What is the function of recycle bin?

    A)
     Store deleted files

    B)
     Store document files

    C)
     Store classified files

    D)
    Store temporary files

    E)
     Store corrupted files

    View Answer play_arrow
  • question_answer20) Which of the following is not input device?

    A)
     Mouse Pad       

    B)
     Touch pad

    C)
     Keyboard         

    D)
     Optical scanner

    E)
     Touch screen

    View Answer play_arrow
  • question_answer21) A Web Page uses which of the following extensions?

    A)
     .mdb   

    B)
     .exe

    C)
     .htm 

    D)
     .hip

    E)
     .xls

    View Answer play_arrow
  • question_answer22) SQL in database management stands for ______

    A)
     Single Query Language

    B)
     Sequential Query Language

    C)
     Structured Query language

    D)
     Structured Question Language

    E)
     Sequential Question Language

    View Answer play_arrow
  • question_answer23) Which process checks to ensure the components of the computer and operating systems are connected properly?

    A)
     Editing 

    B)
     Saving

    C)
     Booting

    D)
     Coding

    E)
     Processing

    View Answer play_arrow
  • question_answer24) Which of the following you will use to move selected text from one place to another?

    A)
     Cut and Paste  

    B)
     Move and save

    C)
     Copy and Paste

    D)
     Move and Paste

    E)
     Delete and Paste

    View Answer play_arrow
  • question_answer25) Most application software today came with an interface called a(n) _______

    A)
     Bar code Reader

    B)
     Voice instruction system

    C)
     Character user interface

    D)
     Graphical user Interface

    E)
     Icon user interface

    View Answer play_arrow
  • question_answer26) What is the best way to protect a computer from viruses?

    A)
     Always operate the computer at room temperature

    B)
     Take the help of computer vendor

    C)
     Never connect computer to internet

    D)
     Install a firewall

    E)
     Install up-to-date anti-virus software

    View Answer play_arrow
  • question_answer27) SMTP stands for _____

    A)
     Simple Mail Tracking Protocol

    B)
     Simple Mail Transport Protocol

    C)
     Sample Mail tracking protocol

    D)
     Sample Mail Transfer Protocol

    E)
     Simple Mail Transfer Protocol

    View Answer play_arrow
  • question_answer28) A company regularly updates a user reference guide. What feature should be included in the reference guide to eliminate confusion regarding which is the current document?

    A)
     Copyright information

    B)
     Data Printed

    C)
     Rename the Document

    D)
     Version Number

    E)
     Authors name

    View Answer play_arrow
  • question_answer29) Information travels between components on the motherboard through ___

    A)
     CMOS 

    B)
     buses

    C)
     Peripherals       

    D)
     Flash memory

    E)
     Bays

    View Answer play_arrow
  • question_answer30) Shortcut notation for group of four Binary Digits is called _____ number.

    A)
     Octal   

    B)
     Hexadecimal

    C)
     Unicode           

    D)
     Decimal

    E)
     Binary   

    View Answer play_arrow
  • question_answer31) OLAP in data processing stands for _____ 

    A)
     Offline Aggregate processing

    B)
     Online Aggregate Processing

    C)
     Online Analysis processing

    D)
     Online Analytical Processing

    E)
     Online Account Process

    View Answer play_arrow
  • question_answer32) In a network ADSL is the abbreviation of ____

    A)
     Asymmetric Dual System Line

    B)
     Asymmetric Digital Sub scriber Line

    C)
     Asymmetric Digital System Line

    D)
     Active Digital System Line

    E)
     Asymmetric Dual Subscriber line

    View Answer play_arrow
  • question_answer33) Which of the following is correct sequence of smallest to largest unit of storage size?

    A)
     Kilobyte, megabyte petabyte, terabyte, gigabyte

    B)
     Kilobyte, megabyte gigabyte, petabyte, terabyte

    C)
     Terabyte, gigabyte, kilobyte megabyte, petabyte

    D)
     Kilobyte, megabyte gigabyte, terabyte, petabyte

    E)
     Megabyte, terabyte, gigabyte, kilobyte, petabyte

    View Answer play_arrow
  • question_answer34) What is the meaning of ?Hi-bernate" in Windows XP dows 7?

    A)
     Shutdown the computer terminating all running application  

    B)
     Restart the computer hibernate mode 

    C)
     Shut down the computer without closing the running applications

    D)
     Shut down the computer without saving new

    E)
     Restart the computer safe mode

    View Answer play_arrow
  • question_answer35) How can you cannot restore a file that has been deleted from a floppy disk.

    A)
     Open windows explorer select the required file and double click on it.

    B)
     You cannot restore a file that has been deleted from a floppy disk.

    C)
     Open the recycle bin. Select the required file and select menu option File \[>\]Undelete

    D)
     Open the windows explorer and right click on file and restore

    E)
     Open the recycle bin, right click on the file and select menu option file \[>\] Restore

    View Answer play_arrow
  • question_answer36) What is the term for unsolicited e-mail?

    A)
     News group      

    B)
     use net

    C)
     spam   

    D)
     backbone

    E)
     flaming

    View Answer play_arrow
  • question_answer37) The two basic types of record access methods in data base are ________

    A)
     Direct and Indexed        

    B)
     Online and real time

    C)
     Sequential and indexed

    D)
     Direct and immediate

    E)
     Sequential and Random

    View Answer play_arrow
  • question_answer38) Which of the following is the largest unit of storage?

    A)
     MB                 

    B)
     Byte

    C)
     GB 

    D)
     TB

    E)
     KB      

    View Answer play_arrow
  • question_answer39) The most important of powerful computer in atypical network is _________

    A)
     Desktop           

    B)
     Dumb terminal

    C)
     Network station

    D)
            Network client

    E)
     Network server

    View Answer play_arrow
  • question_answer40) The first computers were programmed using _________

    A)
     Object code      

    B)
     Assembly language

    C)
     Source code     

    D)
     Spaghetti code

    E)
     Machine language

    View Answer play_arrow

Study Package

NIACL Assistent Class-III Cadre Exam Held on 18-01-2015
 

   


You need to login to perform this action.
You will be redirected in 3 sec spinner