Cs MCQ 2@
Cs MCQ 2@
Sytek Inc. which is now known as Hughes LAN Systems Inc. had created the
NetBIOS protocol in 1983, later used by Microsoft to make its early networks
Answer: IBM
Answer: both analog and digital computer Hybrid computers are those computers
which exhibit features of both the analog computers and digital computers.
4. For which of the following, the term Knowledge Based Information processing
System is being used in recent times?
The term Knowledge based Information Processing Systems (KIPS) is being used
in recent times by the Japanese in context with their efforts towards the fifth
generation of computers. The fifth generation computers are to be powered by
artificial intelligence (AI).
Answer: Fifth
The discussion around the Fifth Generation computers includes new computer
programming and architecture; semantics of programming languages; relational
databases, linguistics theory, artificial intelligence, interference systems and so on.
The term 128 bit era refers to the sixth generation in the history of the video games
and video game consoles. This started in 1998 by Japanese Sega Dreamcast (DC).
Other companies that joined the bandwagon of 128 bit era include Sony
PlayStation 2 (PS2), Nintendo GameCube (GC), and Microsoft Xbox. The seventh
generation of video game consoles started on November 22, 2005 with the launch
of the Xbox 360. The current Eighth generation of video game consoles started in
2012.
Answer: Calculators
The first microprocessors that emerged in the early 1970s were used for electronic
calculators, using binary-coded decimal (BCD) arithmetic on 4-bit words.
8. For his major. role in the development of computer chip Pentium', which Indian
IT expert is called the 'Father of Pentium'?
Answer: 1975
Microsoft was founded by Bill Gates and Paul Allen on April 4, 1975, to develop
and sell BASIC interpreters for the Altair 8800. It rose to dominate the personal
computer operating system market with MS-DOS in the mid-1980s, followed by
Microsoft Windows.
Answer: A computer
Universal Automatic Computer (UNIVAC) was innovated in 1940s that led to the
first commercially Successful computer.
11. ©Brain also known as the first computer virus for MS-DOS was written by two
brothers belonging to which among the following countries?
Answer: Pakistan
Brain is the first PC virus in the world. It began infecting 5.2" floppy disks in
1986. It was the work of two brothers, Basit and Amjad Farooq Alvi of Pakistan.
12. Which among the following was India's first Teraflop supercomputer?
PARAM Padma was the first Indian Teraflop supercomputer. It is India's first
machine ranked on a worldwide supercomputer list.
Answer: 4 Bits
In computing, a nibble (often nybble or even nyble to simulate the spelling of byte)
is a four-bit aggregation, or half an octet. AS a nibble contains 4 bits, there are
sixteen possible values, so a nibble corresponds to a single hexadecimal digit (thus,
it is often referred to as a "hex digit" or "hexit").
A computer is a device which can carry out sequences of arithmetic and logical
operations automatically with the help of computer programming.
Answer: Programs
16. Which of the following devices use computers as control systems for functioning?
Computers are used in a huge arena of human endeavors and act as a second self to
all of us. These act as control systems in a number of household and industrial
devices like industrial robots, microwave ovens, remote controls, smart phones,
personal computers etc.
17. When were the first digital electronic calculating machines developed?
Answer: CPU
A modern computer consists of at least one processing element called the Central
Processing Unit or CPU.
19. Which part of the computer carries out the arithmetic and logical operations?
The processing element caries out the arithmetic and logical operations while the
control unit changes the order of questions in response to stored information.
20. Which of the following are part of the Logical Operations of the computer?
Devices like keyboard and mouse are used to input data and instructions to the
computer and are called the input unit.
Devices like a printer and visual display unit that are used to provide information to
the user in the desired format are called output unit.
All input data and instructions are stored in the memory which is of two types-
primary memory and the secondary memory. Primary memory resides within the
CPU while the secondary memory is external to it.
Control Unit, Arithmetic Logic Unit and Memory together are called the Central
Processing Unit or the CPU.
25. Which of the following comprise the hardware components of the computer?
The components of the computer which we can see and touch are called the
hardware components of the computer. They include devices like keyboard, mouse,
printer etc.
Answer: Programs
The set of instructions or programs that make the computer function using the
hardware parts are called the software. We cannot see or touch software.
28. In a book of which author was the word computer first mentioned?
As per the Oxford English Dictionary, the word "computer" was first used in 1613
in a book called The Yong Mans Gleanings by English writer Richard Braithwait.
29. When did the Online Etymology Dictionary first attested the use of the word
"computer" as one who calculates?
Answer: 1640s
The Online Etymology Dictionary first attested the use of the word "computer" in
the 1640s as one who calculates.
30. Which of the following is seen as the earliest mechanical analog computer?
Answer: Astrolabe
The astrolabe was invented in the Hellenistic world by Hipparchus. The astrolabe
incorporated a mechanical calendar computer.
Charles Babbage, an English mechanical engineer and polymath gave the concept
of a programmable computer. He is considered as the "Father of the Computer".
33. What parts did the first Analytical Engine incorporate which made it the first
design for a general-purpose computer?
34. Who gave the first successful demonstration of use of a simplified. analytical
engine in computing tables in 1888?
Answer: Z2
The Z2, created by a German Engineer Konrad Zuse in 1939, was one of the
foremost examples of an electromechanical relay computer. 36. Which of the
following was considered as the world's first fully automatic digital computer?
Konrad Zuse made the Z3, which was the first fully automatic digital and
electromechanical programmable computer. It was built with 2000 relays.
36. Which was the world's first electronic digital programmable computer?
Answer: Colossus
Colossus was the world's first electronic digital programmable computer which
used a large number of valves.
38. Who had proposed the principle of modern computer in his 1936 paper?
The principle of the modern comnputer was proposed by Alan Turing. His seminal
paper "On Computable Numbers" has proposed a device called the Universal
Computing Machine.
Answer: Prediction
A computer basically has four different functions. They are input, processing,
storage and accuracy.
41. Which of the following stands for the input function of the computer?
Input, storage, processing and output are four basic functions of the computer.
Input basically stands for entering data or receiving or accepting information from
outside sources.
Answer: Buses
A general purpose computer has four components like the Arithmetic Logical Unit,
the Control Unit, the memory and input-output devices. These parts are
interconnected by buses.
43. In each of the computer parts, there are many trillions of electrical circuits
which can be turned on or off with the help of an electronic switch. How are
these arranged?
Each of the electrical circuits is arranged in logic gates so that one of the circuits
may control the other circuits.
Answer: Binary
Each circuit represents a bit (binary digit) information. When the circuit is on, it
represents a "1" and a "0" when it is off in a positive logic representation.
Answer: Bus
The bus connecting the CPU and memory is one of the defining characteristics of
the system and is known as the system bus. Mostly the CPU and Memory they
work synchronously.
49. Which of the following is the correct sequence of stages of data processing
in a computer?
Answer: Data Collection- Input Raw Data- - Output Processing of Desertion out
put The correct sequence of stages of data processing is Data Collection-Input Raw
Data-Processing of Data-Information-Output
50. Which of the following indicates where is the computer is in terms of the
program sequence?
Processors usually get instructions from memory but the sequence is usually
changed by placing of a new value in the PC like branches also called jumps,
subroutine calls and returns.
Registers are normally measured by the number of bits they can hold like an 8-bit
register, a 32-bit register etc.
55. Which of the following registers can hold both data and addresses?
Answer: General Purpose Register
A General Purpose Register can hold both Data and Address. This means they are
combined data/address registers.
56. Which of the following are related to finding information from the RAM?
All three i.e. Memory Buffer Register, Memory Data Register and Memory
Address Register represent a collection of storage registers which are located on
They all fetch separate chips from CPU. information from memory.
57. Which of the following is a single integrated circuit on which a CPUs are
typically constructed?
Answer: Microprocessor
Logic Operations involve Boolean logic: AND, OR, XOR and NOT. These are
used for creating complicated conditional statements and processing Boolean logic.
59. Which of the following serve as both an input and output devices?
Hard Disk Drives, Floppy Disk, Optical Disc Drives serve as both input and output
devices.
Answer: ARM
ARM is a commonly used Assembly language. Its full form is known as Advanced
RISC Machine.
62. Which of the following is a Text-based user interface?
Blaise Pascal had invented the first practical mechanical calculator. It was called
the Pascaline and was used to help his father who was a tax- collector to solve his
sums.
Englishman, George Boole had invented a new branch of mathematics called the
Boolean algebra. Boolean algebra and the binary code help modern computers to
make simple decisions by comparison of long strings of zeroes.
65. Who was associated with the first large-scale digital computer known as
the Harvard Mark I or the IBM Automatic Sequence Controlled Calculator?
The first large-scale digital computer was built by mathematician Howard Aiken
which was sponsored by IBM and thus called as the Howard Mark I or IBM
Automatic Sequence Controlled Calculator.
66. What was the name of the first vacuum tube invented by Lee de Forest in
1906?
Answer: Audio
Audio was the first vacuum tube invented in 1906 by Lee de Forest. It was the size
of a person's thumb and glowing red hot like a tiny electric light bulb. This bagged
him the nickname as "the father of radio".
67. Who had developed a computer named "Woz" described as the hacker's
hacker?
68. Who had conceived the idea of the first ever Graphical User Interface?
Answer: Alan Kay The idea of the very first Graphical User Interface was
conceived by Alan Kay. It was then pronounced as gooey.
69. What was the special feature of the Apple Lisa computer launched in
1983?
Steve Jobs launched the Apple Lisa in 1983 which was the first widely available
computer with a GUI project. desktop. It was Jobs own version of the Alto
70. Which among of the following was the world's first electronic stored-
program computer?
The Manchester Baby was the world's first electronic stored-program computer
built at Victoria University of Manchester by Frederic C. Wiiliams.
71. Who had designed and constructed the first recognizably modern digital
stored-program computer?
Maurice Wilkes had designed and constructed the first recognizably modern
digital stored-program computer.
The first commercial computer was Ferranti Mark 1 built by Ferranti and was
delivered to the University of Manchester and was based on Manchester Mark 1.
The first use of magnetic core was demonstrated in the Whirlwind Computer in
1953. Soon after that commercial production of the same began and it was seen in
IBM 704 and Ferranti Mercury. 74. Which f the following was the first
commercial transistor computer?
Answer: Metrovick 950
75. Who among the following had designed and realized the first single-chip
microprocessor?
The first single-chip microprocessor was Intel 4004 was both designed and realised
by Ted Hoff, Federico Faggin and Stanley Mazor at Intel Corp.
76. EDVAC Was one of the earliest electronic computers. What is its full
form?
An analog computer is the one which is used to process continuously varying data.
This changeable yet continuous data is generally referred to as the analog data.
Answer:
80. What is the meaning of the Greek word anaiogon from which the word
analog has been derived?
An Analog computer uses an analog signal which can also be represented as a sine
wave or a continuous wave which contains many time-varying quantities.
Answer: Intensity
Answer: Intensity
The castle clock which was a hydro-powered mechanical astronomical clock which
was invented by Al-Jazari was the first programmable analog clock
88. Which of the following are the core mathematical operations which are
used in an electric analog computer?
The core mathematical operations which are used in an electric analog computer
are- integration, exponentiation, inversion, addition, multiplication, logarithm and
division.
89. A digital computer processes information in which form?
A digital computer stands for a class of devices which can solve many problems
by processing information in a discrete form. It works on data like magnitude,
symbols, letters etc.
Answer: Binary
Digital data works on various ends of data which include magnitude, letters,
symbols, etc. and are expressed in binary code i.e. using numbers only in two digits
like 0 and 1.
91. Where are the instructions which are used to run a digital computer
stored?
Answer: Memory
All the tasks mentioned above can be performed by a digital computer like
analyzing vast amount of business data, simulation of global weather patterns,
regulation of operations of machines etc.
A digital computer system has four basic functional elements like the input-output
equipment, main memory, control unit and the arithmetic logic unit.
English inventor Charles Babbage is credited with the being the first one to
conceive a successful first automatic digital computer.
john V. Atanasoff who is an Ameican mathematician and also a physicist built the
first electronic digital computer.
Answer: Controller
Hycomp 250 was the first desktop hybrid computing system which was released
by Packard Bell in 1961.
Answer:
100. Who among the following is most likely to operate a personal computer?
Answer: End-user
101. Personal computers in the 2010s have access to which of the following
kinds of software’s?
103. In the history of computing which computer fits the designation as the
first personal computer?
Answer: ENIAC
ENIAC was the first personal computer. It had become operational in 1946.
ENIAC stands for Electronic Numerical Integrator and Computer.
105. Who had invented the magnetic card system for program storage?
Pier Giorgio Proton had first developed the magnetic card system for program
storage. It is a type of card which can store data by modification of tiny iron-based
magnetic particles on a band of magnetic material on a card.
Answer: Michal N
107. Which among the following is considered as the first true personal
computer based on the 8- bit Intel 8080 microprocessor?
Answer: Altair 8800
First true personal computer Altair 8800 which was created by Micro
Instrumentation and Telemetry Systems MITS. It was based on 8-bit Intel 8080
microprocessor. It was introduced in 1974.
Commodore PET was the first successfully mass marketed personal computer.
Apple II and also TRS-80 all together was referred to as the 1977 Trinity.
111. Which of the following devices usually come with touch screens?
The popularity of smart devices has increased the popularity of touch screens for
both portable and functional electronics. These are found in the medical line, heavy
industries, ATMS, room automation etc.
Net tops are a special type of desktops introduced by Intel in February of 2008. Net
tops were characterized by lost cost and thin functionality in addition to Intel atom
processor. The latter allows these to consume less power.
A laptop is similar to any desktop but is portable with all the hardware and other
peripherals built into a single unit. They have a clamshell design.
A subnotebook has all the features of a standard laptop computer but it has smaller
physical dimensions. They are larger than hand-held computers and usually play on
full-versions of the desktop/laptop 0S.
Unlike desktops, the desktop replacement computer has full capabilities of the
desktop computer but is not mobile. They are in the category of a bulkier laptop.
120. The term Big Iron was used to describe which of the following kinds of
computers?
The term Big Iron is used to describe a large, expensive and extremely fast
Mainframe computer.
1. The performance of a hard drive or other storage device, meaning how long it
takes to locate a file is called ?
Access time (or Hard Disk Access Time) is the total elapsed time between the
initiation of a particular request for data and receipt of the first bit of that data.
Answer: Zebibyte
3. A generic name for Intel processors released after the original 8086
processor is
Answer: x86
X86 refers to the instruction set architectures developed by Intel based on the
Intel 8086 microprocessor. As of now, most of the personal Computers and
laptops sold are based on the X86 architecture.
5.. Any piece of data can be returned in a constant time, regardless of its
physical location and whether or not it is related to the previous piece of
data using which of the following?
Answer: RAM
6. What is the name of the digital circuit that performs arithmetic and
logical operations in computers?
The kilobyte is equal to 1024 bytes (210 B), a Common usage. The usage of the
metric prefix kilo for binary multiples rose convenient, because 1024 is
approximately 1000.
Answer: CPU
Input data is transformed into output by central processing unit- CPU. It is the
electronic circuit in a computer that executes the instructions that make up a
program. It performs operations specified by the instructions.
12. What do we call a storage device where the access time is effectively
independent of the location of the data?
Answer: Console
A console is an input/output device on a computer, reserved for communication
between the computer operator or maintenance engineer and the computer. It is
not a platform like PC.
15. Which among the following is used for denoting the detectable
movement of a computer mouse?
Answer: Mickey
Answer: Printer
Answer: Modem
The control unit and ALU usually are referred to as a processor, or central
processing unit (CPU). The operational speed of the CPU primarily determines
the speed of the computer as a whole.
21. This part of the computer does all of the 'thinking'. It can carry out
billions of instructions per second and gets very hot.
Answer: Processor
A processor is the computer's engine. The CPU is the part that actually does
stuff by following the instructions of the computer program that it's running.
24. A computer cannot boot if it does not have which of the following?
25. The system unit of a personal computer typically contains which of the
following?
Answer: All of the Above
The system unit, also known as a "tower", is the main part of a desktop
computer. It includes the motherboard, CPU, RAM, and other components. A
CPU is only a small part of a system unit.
26. Which of the following is known as the brain of the personal computer?
Control unit is known as the brain of the computer. The control unit (CU) is a
component of a computer's central processing unit (CPU) that directs the
operation of the processor.
27. A device which is not connected to the CPU is known as which of the
following? Answer: Off-line device
28. Which of the following store data temporarily and pass it on as directed
by the control unit?
Answer: Register
29. The CPU and memory are located on which of the following?
31. Which of the following is the smallest high- speed storage area in the
CPU?
Answer: Register
The register is the smallest high speed storage area in the CPU. All data must be
represented in register before it can not be processed. A register may hold an
instruction, a storage address, or any kind of data .
A backup UPS i.e. Uninterruptible Power System is often used with computers.
If a UPS is not used with computers, the data stored in the computer is almost
when power is switched off.
33. Monitors, printers, disk drives, keyboard, mouse are included in which
of the following categories?
Answer: Hardware
34. Which of the following is a pointing device that uses light to determine
mouse motion?
35.Which of the following define the information that comes from an external
source and is fed into computer software?
Answer: Input
Whatever goes into the computer is called as input. Input can take a variety of
forms, from commands that are entered from the keyboard to data from another
computer or device.
36. The most common method of entering text and numerical data into a
computer system is through the use of which of the following?
Answer: Keyboard
The keyboard is used as a text entry interface for typing text and
numbers .Keyboard keys typically have characters engraved on them and each
press of a key typically corresponds to a single written symbol.
An output device is any device that receives data from a computer. It is any piece
of computer hardware equipment which converts the electronically generated
information into human- readable form.
38.What is the use of the wheel located between the two standard buttons on a
mouse ?
Answer: To scroll
39. Which of the following devices is used for reading bar coded data ?
A bar code reader is an electronic device that can read and output printed barcodes
to a computer. A barcode reader works by directing a beam of light across the bar
code and measuring the amount of light that is reflected back.
40. Which type of failure occurs because of input device that does not read
data correctly?
This error appears with such a message "A disk read error occurred. This message
refers to the problem on your hard drive or issues during the process of the reading
disk with the operating system.
Answer: Input/output
The I/0 i.e. the input/output devices provide à means of communication between
the computer and the outer world. They are often referred to as the peripheral
devices sometimes.
42. What is the full form of GUI?
GUI stands for a graphical user interface. Graphical user interface basically
provides a set of graphical elements on the screen to the users. Commonly used for
point-and-draw devices.
43. Which of the following devices is used for video games, flight simulators,
training simulators and for controlling industrial robots?
Answer: Joystick
Joystick is the device used for the same. It is a point- and-draw device. It has a
click button, a stick, a ball, a socket as well as a light indicator.
44. Which are the input devices that enable direct data entry into a computer
system from source documents?
They are referred to as data scanning devices. They eliminate the need to key in
text data into the computer. It demands the high quality of input documents.
46. Which of the following is used for 3D positioning and modeling, animation
and other application?
47. Which of the following is the device that is constructed with the series of
sensors that detects hand and finger motion?
48. Which one is the common device used for drawing, painting, or
interactively selecting coordinate positions on an object ?
Answer: Digitizers
Digitizers can be used for drawing, painting and selecting positions. It is any
device which receives analog information and creates a digital representation of it.
49. Document reader and a light pen are classical examples of Which of the
following?
A light pen is a computer input device in the form of a light-sensitive pen. It allows
the user to point to displayed objects or draw on the screen.
Answer: Printer
51. Which of the devices converts drawing, printed text or other images into
digital form ?
Answer: Scanner
Answer: Input
Answer: Character
MICR Code is a character-recognition technology used mainly by the banking
industry. Every bank branch is given a unique MICR Code and this helps the RBI
to identify the bank branch and speed up the clearing process.
54. Which of the following computer memory is both static and nonvolatile?
Answer: ROM
Answer: RAM
Computer programs and operating systems load into RAM. If it has a lot of
processes running at one time, RAM may become overworked and performance
can suffer.
56. Which of the following clearly defines the word Bus Width?
57. When a person turn on your computer, which of the following computer
memory is the first to activate?
Answer: BIOS
BIOS instructions set up the computer and boot the operating system. The BIOS's
primary function is to. handle the system setup process including driver loading
and operating system booting.
58. Which of the following is the another name for Secondary Memory?
Answer: Auxiliary Memory
Answer: SRAM
60. The CPU and Memory are located in which of the following ?
61. Which of the following is the memory in CPU that holds program
instructions, input data and the output information produced?
63. Which is the memory that works on time sharing principle in order to
create an illusion of infinite memory space?
65. Which of the following is the name given to the number of concentric
circles on a diskette?
Answer: Tracks
The platters of a hard disk have two sides for recording the data. Every surface of
the platter has invisible concentric circles on it. These circles are called tracks.
Answer: Flip-flop
The flip flop is an electronic circuit with two stable states that can be used to store
binary data. Flip- flops and latches are fundamental building blocks of digital
electronics systems used in computers and communications.
Answer:
Answer: Glitch
71. Which of the following is the ability of a system to jump directly to the
requested data?
Random-access memory is a form of computer data storage that stores data and
machine code currently being used. A random-accesS memory device allows data
items to be read or written in almost the same amount of time irrespective of the
physical location of data inside the memory.
72. Which of the following is responsible for the fixed disk error?
CMOS is the term usually used to describe the small amount of memory on a
computer motherboard that stores the BIOS settings.
ESD stands for Electrostatic discharge. It is the sudden flow of electricity between
two electrically charged objects caused by contact or an electrical short.
74. Which of the following parts of the systenm is most affected by the ESD
problem?
Expansion board is a printed circuit board that can be inserted into an electrical
connector, or expansion slot, on a computer motherboard.
75. What is the term used for verification of a login name and password in
computer terminology?
Answer: Authentication
Authentication is the process of identifying an individual, usually based on a
username and password. Authentication is distinct from authorization
ECC stands for Error Correcting Code Memory. It is a memory system that tests
for and corrects errors automatically, very often without the operating system being
aware of it.
78. Which of the following is the other name used for a Daughter Board?
79, Which of the following issues clearly points to the overheating of the
system?
80. If your computer is overheating, Which of the following things you can do
about it?
If there is no idea of why your computer started Overheating, open its case and
check that all the fans are running. If CPU is overheating, its heat sink may not be
seated correctly or its thermal paste may be old.
81. Which of the following refer to the error message in a computer system?
Answer: All of the Above
Red Screen of Death may also refer to an error message used on the PlayStation
systems. Blue Screen of Death is an error screen displayed on a Windows computer
system after a fatal system error.
82. Which of the following are the essentials to maintain your computer?
83. Which of the following defines the term computer maintenance properly?
85. A set of changes to a computer program and its supporting data designed
to update, fix, or improve it. What is the name given to this term?
Answer: Patching
86. Which of the following terms is often used for the programs that are used
to find out possible faults in the computer system?
88. There is a situation when BIOS cannot read the partition table
information. What is the name given to such an error?
When BIOS Can not read the partition table information an error is there found to
have Occurred. The error is known as Invalid drive or drive specification.
Answer: Standardization
90. The smallest unit in which data can be stored is known by which of the
following names?
Answer: Bit
The bit is a basic unit of information. The words bit and binary digit are used
interchangeably. The binary digit can have only one of two values. It may be
physically represented with a two-state device.
91. Which of the following is the data storage device that is used to store very
high resolution video formats?
92. The copies of data or program files are always stored as a safety. Which of
the following is the name given to these copies?
Answer: Backups
Backup refers to the copying into an archive file of Computer data so it may be
used to restore the original after a data loss event. The main reason for data backup
is to save important files if a system crash or hard drive failure occurs.
93. Which of the following phenomena is used by the Blu Rays to store data?
Answer: Laser
94. What is the name given to the storage device used for storing very small
amounts of data such as small audio and video files?
A magnetic card is a type of card capable of storing data. The magnetic card
sometimes called swipe card or magistrate. Magnetic cards are commonly used in
credit cards, identity cards, and transportation tickets.
95. What is the maximum limit of data a Compact Disc can store up to ?
Answer: 750 MB
Compact disc is a digital optical disc data storage device .It was co-developed by
Philips and Sony and released in 1982.These have a diameter of 120 millimeters
and can hold up to about 80 minutes of uncompressed audio or about 750 MB of
data.
96. A floppy disk is a magnetic storage medium for computer systems. What is
the size limit of data to be stored on a floppy disk?
A floppy disk is a type of disk storage composed of a disk of thin and flexible
magnetic storage medium.3 /2-inch floppy disk can store data up to 360 KB.8-inch
floppy disk cab store data up to 2.88 MB.
97. How many Gigabyte of information a Digital Versatile Disk (DVD) can
store?
Answer: 4.6
DVD is a digital optical disc storage device developed in 1995.The basic types of
DVD are referred to by a rough approximation of their capacity in gigabytes.
98. What is the name given to the device invented by Dr. Bobeck in 1966 for
mass storage of data ?
Bubble memory is a type of non-volatile computer memory that uses a thin film of
a magnetic material to hold small magnetized areas. Bubble memory is largely the
brainchild of a single person, Andrew Bo beck.
99. Which of the following is the storage device that uses rigid, permanently
installed magnetic disks to store data ?
A hard disk drive is an electromechanical data storage device that uses magnetic
storage to store and retrieve digital information. HDDs are the dominant secondary
storage device for general- purpose computers.
Universal Disk Format (UDF) is a file system for computer data storage for a broad
range of media. UDF is developed and maintained by the Optical Storage
Technology Association (0STA).
101. What is the name given to the most recent storage device technology?
Answer: Floppy Drive
102. When 8 bits are combined, the resulting unit of storage is known by
which of the following names?
Answer: Byte
The byte is a unit of digital information that most commonly consists of eight bits.
The term byte was coined by Werner Buchholz in June 1956.The term octet is used
to specify a size of eight bits
Answer: Holographic Versatile Disc HVD stands for Holographic Versatile Disc.
It has been development by The Holography System Development (HSD) Forum
using a green laser and red writing/reading positioning/addressing laser.
105. There exist a device that stores computer data on a loop of flexible
celluloid-like material. What is the name given to this device?
Answer: Tape Drive A tape drive is a data storage device that reads and writes
data on a magnetic tape. A tape drive provides sequential access storage. Tape
drives can stream data very quickly off a tape.
106. A storage device type that stores computer data after it is turned off. It is
added to a computer beyond the immediately usable main storage. What is the
name given to this device?
Answer: Backing store The term backing storage refers to non-volatile data
storage. Common types of backing storage devices are hard drives, SSD, external
hard disk drives, optical media such as CD or DVD, and flash media such as thumb
drives and memory sticks.
107. How many pins does a Single in-Line Memory Module have?
Answer: 30 or 72
109. Which of the following is the another name given to the LCD display?
Answer: TFT
110. Which of the following is the another name for the Hard Disk Drive?
Winchester Drive is the another term for hard disk drive. The term Winchester
comes from an early type of disk drive developed by IBM that had 30MB of fixed
storage and 30MB of removable storage.
PCI stands for Peripheral Component Interconnect. It is a local computer bus for
attaching hardware devices in a computer. The first version of conventional PCI
found in consumer desktop computers was a 32-bit bus using a 33 MHz bus clock.
112. How many pins are there ona Video Graphics Array connector?
Answer: 15
113. Which of the following correctly defines the Digital Visual Interface?
ATX İs the most common motherboard design. An ATX power supply provides a
number of peripheral power connectors and twO Connectors for the motherboard in
the modern systems.
116. Keyboard Layouts are available in many scripts. Which of the following
are of the Latin Scripts?
117. SysRq (System Request) key is a feature of which of the following type of
keyboards?
Answer: AT Keyboard
118. Which of the following is a display device in which images are produced
when an electron beam strikes a phosphorescent surface?
Answer: CRT
A cathode ray tube (CRT) is a specialized vacuum tube in which images are
produced when an electron beam strikes a phosphorescent surface. Most desktop
computer displays make use of CRTS.
119. It is a type of printer which can print multiple carbon copies at once.
What is the name of this type of printer?
Impact printer refers to printers that work bý banging a head or needle against an
ink ribbon to make a mark on the paper. This includes dot-matrix printers, daisy-
wheel printers, and line printers.
120. There are many types of plotters available. Which of the following is the
type of a plotter?
There are two main types of plotters - drum and flatbed plotters. Drum plotters
spin the paper back and forth on a cylindrical drum while the ink pens move left
and right. The drum plotters are generally smaller than flatbed plotters.
121. Which of the following are the another names for a PEN Drive?
Pen Drive is also known as a USB flash drive, thumb drive, pen drive, gig stick,
flash stick, jump drive, disk key. It is a data storage device that includes flash
memory with an integrated USB interface. It is typically removable, rewritable and
much smaller than an optical disc.
122. Which of the following Limit Range of Data Rates a EIDE Cable
supports?
EIDE was developed by Western Digital and an interface used on IBM compatible
computers. EIDE Supports data rates from 4 and 16.6 MBps.
LGA İS a chip package with a very high density of contacts. LGAS differ from
traditional chips with protruding pins that are inserted into a socket. An LGA chip
has flat pads on the bottom of its package that touch contacts on the motherboard
socket.
Answer: 400MHz The recent Pentium entries are Pentium III and Pentium
4.Pentium 4 are smaller than Pentium lain Pentium III, the bus speed is generally
133 MHz while the bus speed in Pentium 4 is at least 400MHz.
125. Which of the following are the hardware components of the computer
system?
Answer: All of the Above Computer hardware includes the physical, tangible
components of a computer system .It includes CPU, Cabinet, Graphic Card, Sound
Card, Motherboard, Speaker, Keyboard, Mouse, Desktop
3. Computer Components: Software, 0S and Programming Languages
2. What is used in most programs that is a part of a program and guides the
user through certain steps?
Answer: Wizard
A software wizard or setup assistant refers to a user interface type that presents a
user with a sequence of dialog boxes that lead the user through a series of well-
defined steps. Tasks that are complex, infrequently performed, or unfamiliar may
be easier to perform using a wizard.
3. Panther (10.3), Jaguar (10.2), Puma (10.1), and Cheetah (10.0) are
examples of what kind of operating system?
Answer: Mac OS
These are names of Mac OS Operating Systems. The names of various Mac OS are
as follows: Mac OS X Public Beta Mac OS X 10.0 Cheetah Mac OSX 10.1 Puma
Mac OS X 10.2 Jaguar Mac OS X 10.3 Panther Mac OS X 10,4 Tiger Mac OS X
10.5 LeopardMac OS X 10.6 Snow Leopard Mac OS X 10.7 Lion OS X 10.8
Mountain Lion OS X 10.9 Mavericks OS X Page: 6935000+MCQs [Section-L] -
Computers & IT 10.10 Yosemite OS X 10.11 El Capitan macoS 10.12 Sierra
macos 10.13 High Sierra macos 10.14 Mojave macoS 10.15 Catalina
The period of third generation was from 1965-1971. The computers of third
generation used Integrated Circuits (ICs) in place of transistors. Structured
programming languages such as C, COBOL and FORTRAN were used in Third
Generation computers.
7. The slogan "Write once, run anywhere" is related to which of the following
programming languages?
Answer: Java
Write once, run anywhere (WORA) slogan was given by Sun Microsystems to
illustrate the cross- platform benefits of the Java language. The idea was that Java
Programmed could be developed on any device, then compiled into a standard byte
code and then could be run on any device which is equipped with Java virtual
machine ((VM).
In computer systems (particularly UNIX and UNIX like OS), root directory is the
first and top-most directory in the hierarchy.
10. Which among the following is used for removing a software bug / defect
which is available for free of cost from the software provider?
Answer: patch
A patch is a collective name of all the changes to a computer program aimed to
update, fix, or improve it including addressing the security vulnerabilities and other
bugs.
11. Which of the following is a suitable term for any programmable content of
a hardware device configurations and data for application-specific integrated
circuits (ASICs), programmable logic devices, etc?
Answer: Firmware
Answer: cOBOL
13. Which of the following audio video formats was developed by Microsoft?
Answer: WMA
Answer: Apple
The Macintosh was the brand name of the personal computers designed and sold
by Apple Inc. since January, 1984. Since 1998, it was branded as Mac.
15. Which among the following is the correct order in which popular
company Apple released them?
The following is the correct order : 1. Mac was introduced in 19842. Ipod was
introduced in 20013. Iphone was introduced in 20074. Ipad was introduced in 2010
16. Which of the following correctly defines a software?
17. Who among the following gave the first theory related to computer
software?
The first theory about software prior to creation of computers was proposed by
Alan Turing in his 1935.This eventually led to the creation of the academic fields
of computer science and software engineering.
Answer: Antivirus
Answer: Process
Software can be grouped into a few broad categories: Application Software System
Software Malicious Software
23. Which of the following is the first layer of software loaded into computer
memory wh starts up?
24. What is the name given to a person who designs the programs in a
software package?
The programs included in a system software package are called system programs.
The programmers who design them and prepare them are called system
programmers.
There are several SDLC models available such as Waterfall Model, Iterative
Model, Spiral model, V- model and Big-bang Model etc.
Various system design and analysis tools are DFDS (Data Flow Diagrams),
Structured Charts, Structured English, Data Dictionary, HIPO (Hierarchical Input
Process Output) diagrams, ER (Entity Relationship) Diagrams and Decision tables.
CASE Stands for Computer Aided Software Engineering. CASE tools are set of
automated software application programs, which are used to Support, accelerate
and smoothen the SDLC activities.
Answer: Monitor
Software is a general term for the various kinds of programs used to operate
computers and related devices. Monitor is a hardware component soft the computer
system.
In 1983, Richard Stallman launched the GNU Project to write a complete operating
system free from constraints on use of its source code.
32. Which of the following programs remains in the memory while other
programs are executing?
A resident program is a computer program that uses a system call in D0S operating
systems to return control of the computer to the operating system.
33. Which of the following is the software that resides on a single computer
and does not interact with any other software installed in different computer?
Standalone program is one that run as a separate Computer process, not an add-on
of an existing process. It is an application, which can be run without the need for
installation procedure.
34. What is plan 9 form the Bell labs?
Answer: Singularity
37.Which of the following correctly define the meaning of the word Kernel?
Answer: It is the set of primitive functions upon which the rest of operating
system functions are built up.
A kernel is the central part of an operating system. The kernel is the lowest level
of the operating system. The kernel is the main part of the operating system and is
responsible for translating the command into something that can be understood by
the computer.
38. Which of the following graphs tell us the correct and appropriate way to
determine the deadlock situation occurrence?
A resource allocation graph tracks which resource s held which process and which
process is wafting for a resource of a particular type. It is very Powerful and simple
tool to illustrate how interacting recesses can deadlock.
40. Which of the following are the most important criteria for measuring the
performance of an Operating system?
The CPU efficiency input decreases as the turnaround time/ waiting time of the
processor increases. it is desirable to have less turnaround time and waiting time
for all processes.
41. Which of the following scheduling techniques is the most widely used in a
time shared operating system?
Answer: 8
The compilation process is a sequence of various phases. Each phase takes input
from its previous stage, has its own representation of source program, and feeds its
output to the next phase of the compiler. There are around 8 phases in compiler.
Answer: Yacc
Yacc stands for "yet another compiler compiler. It is the standard parser generator
for the Unix operating system. Yacc generates code for the parser in the C
programming language.
46. There is a technique which uses disk for reading and storing output files.
What is the name given to such a technique?
Answer: Spooling
47. Which of the following is the dominant Operating System in the world?
Answer: Microsoft
Answer: UNIX
Answer: Linker
A linker is a computer program that takes one or more object files generated by a
compiler and combines them into one, executable program. The compiler
automatically invokes the linker as the last step in compiling program.
50. Which of the following are the three different categories that application
software is divided into?
Answer: Siri
Siri is a virtual assistant that is part of Apple Inc.'s iOs. The assistant uses voice
queries and a natural- Page: 83 35000+McOS [Section-L] - Computers & IT
language user interface to answer questions.
Daniel Bricking is best known as the co-creator of VisiCalc, the first electronic
spreadsheet. In addition to the spreadsheet, he helped develop one of the first word
processing systems and programmed the most popular prototyping tool of the
MSDOS world.
54. There are many application software packages available at present. Which
of the following is an application software package?
Answer: Spyware
Spyware is an unwanted software that infiltrates the computing device, stealing
internet usage data and sensitive information and sending it to Someone across
internet.
56. To locate a lost file on your Macintosh, which of the following applications
is used?
Answer: Sherlock
Sherlock app was named after Sherlock Holmes. It was a file and web search tool
created by Apple Inc. an extension of the Mac OS Finder's file searching
capabilities.
Answer: Chandler
Answer: Sunbird
Mozilla Sunbird is a discontinued free and open- source, cross-platform calendar
application that was developed by the Mozilla Foundation. Development of
Sunbird was ended to focus on development of Mozilla Lightning.
Pendragon Forms is a robust forms designer and mobile data collection software.
Hand Base takes the fields defined and creates a data entry screen automatically.
64. Which of the following is the numerical computing software for scientists
and mathematicians?
Answer: MATLAB
Answer: ArcGIS
ArcGIS is a geographic information system. It i used for working with maps and
geographic information. It is used for creating and using maps, compiling
geographic data, analyzing mapped information etc.
66. What is the name given to the application which only runs on one
platform, increasing the desirability of that platform?
67. What is the name given to the specialized application that is build for a
specific business?
There are many types of educational software’s. Some of them are Dictionaries,
Encarta, Britannica, MATLAB, Google Earth, NASA World Wind etc.
70. Which of the following issues are related to the Software aging? Answer:
Both a and b
73. Which of the following are the other terms used for Software Decay?
Software Decay is also known as software rot, code rot, bit rot, software erosion,
software decay or software entropy. It is a slow deterioration of software
performance over time.
74. What is full form of the YAGNI principle used in software system
designing?
You aren't gonna need it or YAGNI is a principle of extreme programmg that states
a programmer should not add functionality unti! deemed necessary.
76. Which of the following is the another term used for Software hosting?
Hosted, on-demand, cloud computing, software as a service all mean the same
thing. Organizations host their software and data externally with a provider and can
access it over the internet from anywhere at any time.
77. What is the name given to the program capable of running on any
computer regardless of the operating system?
Answer: Applet
78. What is the name given to the malicious software that is considered to fall
between normal software and a virus?
Answer: Grey Ware
Greyware is a term for which all other malicious software such as adware,
spyware, trackware, and other malicious code and maliious shareware fall under.
79. Which of the following is the name given tO the illegal copy of software?
Answer: Bootleg A bootleg is an illegal copy of software that purchased from the
developer or retail store. It is synonymous with piracy, and there are many lawS
which prohibit and restrict the sale of bootleg software.
80. What is the name given to any software that is included with a new
computer, hardware, or other software program?
81. Which of the following is the term used for Nirvana Graphical Editor?
Answer: NEdit
Nedit is also known as the Nirvana editor. It is a graphical text editor for the X
Window System. It is primarily used for editing source code.
82. Which of the following is the term used to describe software that is pre-
packaged by the developer of the product?
Answer: Off-the-shelf
84. Which of the following is the term used for the way in which multiple
teams of developers collaborate on a software project?
Answer: Agile
Agile development methods are a set of procedures that dictate the ways in which
multiple teams of developers collaborate on a project. The term "agile software
development" was introduced in 2001
86. What is the name given to the computer software that is still in the early
testing phase?
Alpha software is computer software that is stil in the early testing phase. It is
functional enough to be used, but is unpolished and often lacks many of the
features.
87. Which of the following terms is used for a software that is built from an
existing program?
Answer: Brownfield
88. What is the term used for computer software that is undergoing testing
and has not yet been officially released?
Beta software refers to computer software that is undergoing testing and has not
yet been officially released. The beta phase follows the alpha phase.
Answer: Lingo
John McCarthy was an American computer scientist. McCarthy was one of the
founders of the discipline of artificial intelligence. He coined the term "artificial
intelligence" and developed the LISP programming language family
Answer: Prolog
The most characteristic features of the programming language Prolog are its built-
in support for unification and backtracking. It was developed by Alain Colmerauer.
94. Which of the following are the two categories of the Low Level
Languages?
BASIC Stands for Beginners All Purpose Symbolic Instruction Code. It is a family
of general-purpose, high-level programming languages whose design philosophy
emphasizes ease of use.
97. Which of the following languages is widely known for the use of turtle
graphics?
Answer: LOG0
98. Which of the following programming languages was designed for the use
in Healthcare Industry?
Answer: MUMPS
99. Which of the following is one among the time- sharing programming
languages?
Answer: Joss
Joss stands for johnnies Open Shop System. It was one of the very first interactive,
time-sharing programming languages. JOSS was developed by J. Clifford Shaw.
100. Which of the following is true about ADA?
Databases in Access are composed of four objects: tables, queries, forms, and
reports. Microsoft Access Pivot Table Database allowed to select one row heading,
one column heading, and one filter field. It has been removed in Access 2016.
Answer: SQL
5. Which of the following DBMS is well-suited for data warehouses that have a
large number of similar data items?
Answer: E.F.Codd
Michael Widenius is known as the Father of MySQL. He is the main author of the
original version of the open-source MySQL database and a founding member of
the MysQL AB company.
10. What is the name given to the skilled and trained professional who directs
all activities related to an organization's database?
There are many types of Database Languages. A few among them are - Data
Definition Language. DDL stands for Data Definition Language, Data
Manipulation Language, Data Control Language etc.
12. Which language is used to make changes made by the DML statement?
Answer: Transaction Control Language
Transaction Control Language is used to run the changes made by the DML
statement.(TCL) commands are used to manage transactions in the database.
13. What is the name given to the view of database that appears ta appears to
an application program?
Answer: Subschema
The subschema is the logical description of that section of the database which is
relevant and available to an application. A subschema is a subset of the schema and
inherits the same property that a schema has.
Databases in MS Access are composed of four objects. These are tables, queries,
forms, and reports. Together, these objects allow us to enter, store, analyze, and
compile data according to the wish.
15. There are many types of database models .Which among the following are
those types ?
A database model is a type of data model that determines the logical structure of a
database and fundamentally determines in which manner data can be stored,
organized and manipulated. Types of database models are Hierarchical database
model, Relational model, Network model, Object oriented database model, Entity-
relationship model, Document model, Entity-attribute-value model,Star schema
etc.
17. Data query languages are computer languages used to make queries in
databases and information systems. Which among the following are the Query
Languages?
Atomize is the graph query language for the Open Cog graph data base. Cipher is a
query language for the Neo4j graph data base . Data log is a query language for
deductive databases.
Andreas Reuter and Theo Harder coined the acronym ACID for Atomicity,
Consistency, Isolation, and Durability. In the context of databases, a sequence of
database operations that satisfies the ACID properties is called a transaction.
The DBMS manages three important things: the data, the database engine and the
database schema. The database schema defines the database's logical structure.
20. Which of the following is the final step when it a has determined that a
transaction has been completed successfully?
Answer: Commit
21. What is the name given to the undoing of partly completed database
changes?
Answer: Rollback
BLOB stands for Binary Large Object. In SQL, BLOB can be a general term for
any data of type long varbinary, long varchar, or long watcher. It is also a specific
term for data of type long varbinary.
Answer: Deadlock
Deadlock is a situation in which resources are held by two or more connections that
are each needed by the other connections so that they are stuck in an infinite wait
loop.
24. What is the name given to the library of related functions that are not
loaded into memory until they are called by the application program?
Answer: DLL
Dynamic Link Library is the library of related functions that are not loaded into
memory until they are called by the application program. All RDM APIs are
contained in DLLS on those operating systems that support them.
Edge computing refers to the computing infrastructure at the edge of the network,
close to the sources of data. Edge computing reduces the communications
bandwidth needed between sensors and the datacenter.
27. Who among the following proposed the R-tree for the first time?
IEC stands for International Electro technical Commission. Along with the ISO,
the IEC controls the SQL standards and many others as well.
29. Which of the following is the attribute which can be used to uniquely
identify a row of data in a given table?
30. The CAP Theorem concludes that it is not possible for a distributed
computer system to provide three guarantees at the same time. Which of the
following are among these three guarantees?
The CAP Theorem consists three following terms: Consistency states that each
computer node contain all of the same data at the same time. Availability states that
each database request is responded to as either successful or failure. Partition
tolerance states that the database system continues operating even when not all
nodes are connected to to one another and suffer communication issues.
Sharding is a type of database partitioning that separates very large databases the
into smaller, faster, more easily managed parts called data shards. The word shard
means a small part of a whole.
32. Which of the following is the term used to describe the process of
forecasting in data?
33. Which among the following is the term given to the three rules to find
logically implied functional dependencies?
The three rules given by Armstrong are knoWn as Armstrong's axioms. It refers to
the sound and complete set of inference rules that is used to test logical implication
of functional dependencies.
Answer: 3NF
38. Which of the following is the most commonly used operation in relational
algebra for projecting a collection of records from a relation?
Answer: Select
Select is used to view the tuples of the relation with or without some constraints.
This operation is used to select rows from a table that specifies a given logic, which
is called as a predicate. The predicate is a user defined condition to select rows of
user's choice.
39. What is the name given to the special type of stored procedure that
automatically executes when an event occurs in the database server?
Answer: Trigger
40. What is the name given to the situation where the lock waits only for a
specified amount of time for another lock to be released?
The Lock Timeout event class indicates that a request for a lock on a resource. It
has timed out because another transaction is holding a blocking lock on the
required resource.
Answer: ActiveX
ActiveX is a software framework created by Microsoft that adapts its earlier
Component Object Model (COM) and Object Linking and Embedding (OLE)
technologies for content downloaded from a network, particularly from the World
Wide Web. It is used till IE11 but not Microsoft Edge.
3. The terms Good put, Throughput and Maximum throughput are most
closely associated with which among the following in computers?
The bit rate is the number of bits that are conveyed or processed per unit of time in
computing and telecommunication. For example 1 kbit/s refers to 1000 bits/s while
1MBPS means one million bits per second. One byte per second (1 B/s)
corresponds to 8 bit/s.
Answer: Netware
Answer: Dynamic Host Configuration Protocol DHCP stands for Dynamic Host
Configuration Protocol. It is a client/server protocol that automatically provides an
Internet Protocol host with its IP address and other related configuration
information.
Answer: Nodes
Answer: Topology
System Area Network is used to explain a relatively local network that is designed
to provide high- speed connection in server-to-server applications, storage area
network and processor-to-processor applications. The computers connected on a
SAN operate as a single system at very high speeds.
10. Which of the following are the primary ways to enable LAN Connections?
Ethernet and Wi-Fi are the two primary ways to enable LAN Connections. Ethernet
is a specification that enables computers to communicate with each other. Wi-Fi
uses radio waves to connect computers to the LAN.
11. Which of the following is true about Fiber Distributed Data Interface?
Fiber Distributed Data Interface is a set of ANSI and ISO standards for data
transmission on fiber optic lines in a local area network that can extend in range up
to 200 km. The FDDI protocol is based on the token ring protocol. An FDDI local
area network can support thousands of users.
Answer: ARCNET
ARCNET İs a LAN technology that uses a token-bus scheme for managing line
sharing among the workstations and other devices connected on the
LAN.ARCNET İS one of four major LAN technologies, which also include
Ethernet, token ring and FDDI.
15. Which one of the following is the first scientist to bring the idea of
Personal Area Network?
Thomas Zimmerman was the first research scientist to bring the idea of the
Personal Area Network. Personal Area Network covers an area of 30 feet
Answer: Ethernet
In MAN, various LANS are connected to each other through a telephone exchange
line. The most widely used protocols in MAN are RS- 232, Frame Relay, ATM,
ISDN, OC-3, ADSL, etc.
17. Which among the following correctly defines a Wide Area Network?
A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fiber optic cable or satellite links.
18. Which of the following is the reference model used for internetworking ?
Answer: OSI
The most common access method of the bus topologies is CSMA or Carrier Sense
Multiple Access, It is a media access control used to control the data flow so that
data integrity is maintained so that the packets do not get lost.
20. What is the name given to the wireless network communication over short
distances using radio or infrared signals?
21. Which of the following networking hardware can operate at anyone of the
seven layers of the open systems interconnection model?
Answer: Gateway
Gateways are distinct from routers or switches in that they communicate using
more than one protocolh6k and can operate at any of the seven layers of the open
systems interconnection model.
22. Which of the following networking devices forwards data packets between
computer networks?
Answer: Router
23. In the 0SI model, Bridging is performed in which of the following layers?
Answer: Data Link Layer
In the OSI model, bridging is performed in the data link layer. A network bridge is
a computer networking device that creates a single aggregate network from
multiple communication networks or network segments.
24. Which of the following networking devices is used for delivery of messages
between VPN nodes?
26. Which of the following device distributes network traffic across a number
of servers?
A load balancer is a device that actS as a reverse proxy and distributes network or
application traffic across a number of servers. Load balancers are used to increase
capacity and reliability of applications
27. What is the name given to the electronic device that receives a signal and
retransmits it at a higher level?
Answer: Repeater
28. What is the name given to the device that converts between two different
types of transmission for interoperation?
Answer: Switch
30. Which one of the below is known as the Multi- Port Repeater?
Answer: Hub
A layer 3 switch is a switch and a router built together for fast performance. A
router is a networking device that forwards data packets between computer
networks.
NIC stands for Network Interface Card. It is used to connect the computer to the
external network. It will normally have a PCI connector to connect to one of the PC
expansion slots.
33. Which of the following is used to connect computers and other end user
devices to networking devices such as hubs & switches?
. 34. Which one of the following sends data packets to all devices on a network
regardless of any MAC addresses?
Answer: Hub
A hub is a hardware device that relays communication data. A hub sends data
packets to all devices on a network. The hub allow system administrators to
monitor data passing through and to configure each port.
35. Which one of the following devices converts digital signal to analog signal
and vice versa?
Answer: Modem
Modem is a device that converts digital signal to analog signal as a modulator and
analog signal to digital signal as a demodulator. Asynchronous modem uses start
and stop bit for synchronization instead of clock.
36. Which of the following hubs can store, amplify, split and retransmit the
received signals?
Active hub can store, amplify, split and retransmit the received signals. It requires
additional electronic circuit for performing different functions.
37. What are the other names for a Network Interface Card?
Source route bridge is used on token ring networks. Bridge derives the entire path
of the frame embedded in the header of the frame and decides how to forward the
frame through out the network till it reaches its destination.
40. Which one of the following routers sits on the periphery of the network?
Answer: Both band c
An access router is a router that sits at the periphery of a network. It is also known
as edge router. It Contrast with "core router," which is a router that resides in the
middle of the network.
41. What do we call the time it takes for an entire message to completely
arrive at the destination from the time the first bit is sent out from the Source?
Answer: Latency
The latency or delay defines how long it takes for entire message to Completely
arrive at the destination from the time the first bit is sent out from the source.
42. Which of the following represents Latency?
It can be said that the Latency is made of four components: propagation time,
transmission time, queuing time and processing delay. Latency =propagation time
+transmission time +queuing time + processing delay
43. What is the actual measurement of data that can be sent over network?
Answer: Throughput
The throughput is the actual measurement of data that can be sent over network. It
is different from Bandwidth which is the maximum amount of data that can travel
through a network.
44. What is the maximum amount of data that a channel can transmit called
as?
Answer: Bandwidth
The term bandwidth refers to the maximum amount of data that a channel can
transmit. For example if the bandwidth of a Fast Ethernet network is a maximum of
100 Mbps then this network can send 100 Mbps or less depending on various
factors.
45. What is the time needed by each device on a network, to hold the message
before processing. called as?
The time needed for each intermediate or end device to hold the message before it
can be processed. The queuing time is not constant as it changes with the load
imposed on the network.
The transmission time, is the amount of time from the beginning until the end of a
message transmission. It depends on the size of the message and the bandwidth of
the channel. Transmission time =Message size/ Bandwidth
Answer: 4 bits
Nibble refers to the half of an eight-bit byte or four binary digits. Byte is a group
of bits (8 bits) used to represent a character. A byte is considered as the basic unit
of measuring memory size in computer.
The sine wave is the most fundamental form of a periodic analog signal. A periodic
signal completes a pattern within a measurable time frame, called a period, and
repeats that pattern over subsequent identical periods.
Answer: 800 Hz
Data rate depends on three factors: 1. The bandwidth available 2. The level of the
signal in use 3. The quality of the channel (the level of noise)
The bit length is the distance one bit occupies on the transmission medium. It is
given by the formula: Propagation speed * bit duration.
Typically the source of data is a computer, but it can be any other electronic
equipment such as telephone handset, video camera, etc, which can generate data
for transmission to some destination.
53. Which of the following device is used to convert the native data into
signal? Answer: Modem
As data cannot be sent in its native form, it is necessary to convert it into signal.
This is performed with the help of a transmitter such as modem.
54. What is the length of each character in ASCII code?
Answer: 7-bit
ASCII code is used to represent digital data. In ASCII code, each character is
represented by a 7-bit code.
55. What do we call the time required to send one single bit?
The bit interval is the time required to send one single bit. It, along with bit rate, is
used to describe the digital signals.
56. What is the number of bit interval per second known as?
The bit rate is the number of bit interval per second. This mean that the bit rate is
the number of bits send in one second, usually expressed in bits per second.
57. Which of the following uses digital signaling, which is inserted in the
transmission channel as voltage pulses?
Answer: Base-band
Base-band signaling is defined as one that uses digital signaling, which is inserted
in the transmission channel as voltage pulses.
58. What is the loss of signal's energy due to resistance of the medium known
as?
Answer: Attenuation
Attenuation is the loss of signal's energy due to resistance of the medium. It is not
the same as Distortion which is the alteration of the signal due to different
propagation speeds.
59. What is the alteration of the signal due to differing propagation speeds of
each of the frequencies called as?
Answer: Distortion
Distortion is the change in the waveform of the signal due to noise. It is the
alteration of the signal due to differing propagation speeds of each of the
frequencies.
60. Which of the following noise may occur when signals at different
frequencies share the same transmission medium?
When signals at different frequencies share the same transmission medium, the
result may be intermediation noise. Signals at a frequency that is the sum or
difference of original frequencies or multiples of those frequencies will be
produced.
5. BSNL, Reliance, Shaw cable, AOL, Tata Indicom all can be kept in which
one of the following groups?
Answer: ISP
The HTTP 404, 404 Not Found, 404, Page Not Found, or Server Not Found error
message is Hypertext Transfer Protocol standard response code. In computer
network communications it indicates that the browser was able to comnmunicate
with a given server but server cant find it.
Answer:
World Wide Web Consortium The World Wide Web Consortium is the main
international standards organization for the World Wide Web. It was Founded in
1994.The consortium is made up of member organizations.
9. What would be the number of bytes, transferred at the rate of 1 Kilobit per
second?
Answer: 125
kilobit per second (symbol kbit/s or kb/s, often abbreviated "kbps") is a unit of data
transfer. The rate equal to 1,000 bits per second. It is 125 bytes per seCond.
11. Which among the following has been standardized in the IEEE 802.3
specification?
Answer: Ethernet
12. While browsing internet, what do we call the area of storage that
compensates for the different speeds of data flow or timings of events by
temporarily holding a block of data that is waiting to be processed?
Answer: Buffer
13. Which among the following was the first operational packet switching
network, and the predecessor of the Internet?
Answer: ARPANET
The Advanced Research Projects Agency Network or ARPANET was the first
wide-area packet- switching network with distributed control. It is the predecessor
of Internet. It is one of the first networks to implement the TCP/IP protocol suite
which became the technical foundation of the Internet.
14. Which among the following is the essential character of the ADSL
Internet Connections?
Answer:
High Download Rate, Low upload Rate ADSL - asymmetric digital subscriber line
is a type of broadband communications technology used for connecting to the
Internet. ADSL allows more data to be sent over existing copper telephone lines. It
is characterized by High download rate and low upload rate.
15. In context with the dotted number format used in the IPv4 , which among
the following is NOT possible?
Answer: 259.1.1.268
Please note that the above arrangement is known as dotted quad' and in any of the
4 figures, the value can not exceed 256. So correct option is C
Answer: MeeGo
Optical fibers have around 26,000 times more transmission capacity than twisted-
pair cable and Coaxial cables have around 80 times more transmission capacity
than twisted pair cables.
IEEE 802.3 is a set of standards put forth by the Institute of Electrical and
Electronics Engineers (IEEE) that define Ethernet-based networks as well as the
name of the working group assigned to develop these standards.
The IEEE 802.8 defines the LAN standard for fiber optic media used in token
passing computer networks like FDDI.
20. Which of these standards is used to define higher layer LAN protocols?
IEEE 802 standard is a family of IEEE standards dealing with local area networks
and metropolitan area networks. IEEE 802.1 deals with higher layer LAN
protocols.
21. Which of these network topologies has every computer and network
device connected to single cable?
Answer: Bus
Bus topology is a network type in which every computer and network device is
connected to single cable. It is ideal for small networks.
One of the advantages of TREE network topology is that the error detection is
easily done. Also, it is easy to manage and expand.
23. Which of these network topologies have all the network nodes connected
directly to each other?
Answer: Mesh
Answer: Network is not affected by high traffic In Ring topology, each computer
is connected to another computer, with the last one connected to the first. Exactly
two neighbors are there for each device. The advantage of using a Ring network
topology is that the network is not affected by high traffic.
25. Which of these networks usually have all the Computers connected to a
hub?
Answer: Star
In Star topology, all the computers are connected to a single hub through a cable.
This hub is the central node and all others nodes are connected to the central node.
26. Which of the following transmission medium has categories named as RG-
58, RG-59 and RG-11?
There are three categories of coax cables namely, RG-59 (Cable TV), RG-58 (Thin
Ethernet), and RG-11 (Thick Ethernet). RG stands for Radio Government.
Fiber Optic works on the properties of light. When light ray hits at critical angle it
tends to refracts at 90 degree. This property is the basis of fiber optics.
28. Which of these standards is defined by IEEE 802.3ab?
29. What do we call the network design containing more than one topology?
Answer: Hybrid
A network structure whose design contains more than one topology is said to be
hybrid topology. Hybrid topology has all the merits and demerits of all the
incorporating topologies.
Answer: 10 Mbps
NIC stands for Network Interface card. A network interface card (NIC) is a
hardware component which is installed on a computer so that it can connect to a
network.
Fibers are used instead of metal wires because signals travel along them with less
loss. Also, fibers are immune to electromagnetic interference, a problem from
which metal wires suffer excessively. In addition, Fibers are also used for
illumination and imaging.
Twisted paired cables are cost-effective and easy to install. But different pairs
within the cable have different delays, due to different twist rates that are used to
minimize crosstalk between the pairs.
CAT5e can support upto 1 Gbps speeds. It was made as an improvement over
CAT5 cables which can support data transmission upto 10OMbps.
CAT2 or Category 2 cable supports speeds upto 4Mbps. It is used mostly for token
ring networks. It is an improvement over Category 1 cable which supports speed up
to 1 Mbps.
Answer: 802.11
The IEEE 802.11, which is a part of the IEEE 802 set of LAN protocols, defines
the standards for implementing wireless local area network.
Answer: Infrared
Infrared waves are used for communication for very short distances. These are
most commonly used in TV remotes, wireless mouse, keyboard, printer, etc.
WI-Fi stands for Wireless Fidelity. It is a local area wireless technology. It allows
an electronic device to transfer data or connect to the internet using radio waves.
41. Which of the following devices can help to extend the range of a wireless
router?
Wireless adapters are those hardware devices which are installed inside computers
to enable wireless connectivity. If a computer does not have a wireless adapter, it
will not be able to connect to a router in order to access the Internet.
Answer: 2G
GSM stands for Global System for Mobile. Before this it was known as Group
Special Mobile. As GSM increases its global presence, the term was changed to
Global System for Mobile.
45. What do we call the process of transferring a mobile station from one base
station to another?
Hand off is the process of transferring an active cal or data session from one cell in
a cellular network to another or from one channel in a cell to another..
Answer: CDMA
UMTS uses wideband code division multiple access (W-CDMA) radio access
technology which offers greater spectral efficiency and bandwidth to mobile
network operators.
48. What is the maximum data transfer speed offered by Bluetooth 4.0?
Answer: 24 Mbps
The maximum data transfer speed offered by Bluetooth 4.0 is 24 Mbps. It is same
as the speed offered by Bluetooth 3.0.
Answer: Analog
The radio signals used by 1G networks are analog. While the radio signals used by
the 2G networks are digitals. This is one of the main differences between 1G and
2G.
Answer: AMPS
51. What do we call the handoff in which there is a break in the connection on
the cellular network?
Hard Handoff refers to an actual break in the connection while switching from one
cell or base station to another. The switch takes place so quickly that it can hardly
be noticed by the user.
52. What is the maximum download speed offered under LTE-Advanced
standard?
Answer: 1 Gbps
The maximum download speed offered under LTE- Advanced standard is 1 Gbps.
The LTE advanced is the 10the version of LTE.
Answer: Ionosphere
The line of sight communication is affected by (a) the line of sight distance (b) the
curvature of the earth. The space waves are used for line of sight communication
such as television broadcast, microwave link and satellite communication.
55. What should be the minimum antenna size for a signal with the
wavelength (in meter) ?
Answer: A/4
57. Which university was connected for the first time with the Stanford
Research Institute under ARPANET?
The first ARPANET link was established between the University of California, Los
Angeles (UCLA) and the Stanford Research Institute.
ARPANET stands for Advanced Research Projects Agency Network. It was the
first network to implement the TCP/IP protocol suite.
Answer: Packet-switching
Answer: 1990
The ARPANET, which was initially funded by the Advanced Research Projects
Agency (ARPA) of the United States Department of Defense, was shutdown and
dismantled in the year 1990.
61. Which of these provided the first online service to offer electronic mail
capabilities to personal computer users?
Answer: CompuServe
CompuServe was the first service to offer electronic mail capabilities and technical
support to personal Computer users. They started the service in 1979.
62. Which of the following countries had a packet- Switching network called
as 'CYCLADES?
Answer: France
The CYCLADES packet switching network was a French research network. It was
the first network to make the hosts responsible for reliable delivery of data, rather
than the network itself.
Answer: X.25
X.25 is an ITU-T standard protocol suite for packet- Switched wide area network
(WAN) communication. Unlike ARPANET, it was available for business use.
64. Which of these networks is used for communication between bulletin
board systems?
Answer: FidoNet
65. What is the name of the first computer virus, that affected ARPANET?
Answer: Creeper
Creeper is the first network computer virus, which infected Arpanet in 1971. Bob
Thomas created Creeper as an experimental self-duplicating program that was
intended not to inflict damage on, but to illustrate a mobile application.
66. Who was the first head of the state to send an email?
The Computer Science Network (CSNET) was a computer network that began
operation in 1981 in the United States. The CSNET project was funded by the
National Science Foundation for an initial three- year period from 1981 to 1984.
Answer: 1983
Domain Name System was invented in 1983. Paul Mockapetris invented the
Domain Name System (DNS) thus expanding the internet
. 69. Which of these was the split off version of ARPANET for the military
use?
Answer: MILNET
MILNET was the name given to the part of the ARPANET internetwork
designated for unclassified United States Department of Defense traffic. MILNET
was physically separated from the ARPANET in 1984.
Tim Berners-Lee invented the World Wide Web in 1989. HTML documents were
transmitted over the Internet by a web server to web browsers using Uniform
Resource Locators.
ICANN was created in 1998 to manage IP address space and DNS root zone. The
Internet Corporation for Assigned Names and Numbers (ICANN) is a nonprofit
organization responsible for coordinating the maintenance and procedures of
several databases related to the namespaces and numerical spaces of the Internet.
Answer: 1985
Answer: Archie
The Archie search engine is known to be the first search engine. It was developed
in 1991 and was followed by WAIS and Gopher.
Answer: Gopher
ARPANET was developed under the direction of the U.S. Advanced Research
Projects Agency (ARPA) in 1969. It was the network that became the basis for the
Internet. 76. In which year, SMTP was developed? Answer: 1982 Simple Mail
Transfer Protocol (SMTP) was developed in 1982. It is an Internet standard for
email transmission. Extended SMTP is the protocol in widespread use today.
77. What does ISDN stand for?
ISDN stands for Integrated Services Digital Network. It establishes the connection
using the phone lines which carry digital signals instead of analog signals.
78. Which of the following internet connections serves only textual matter of a
web page?
In Shell Connection, the user will get only textual matter of a Web Page as it does
not support Graphics display or multimedia files.
80. Which of the following device encodes and decodes the analog signals in a
dial-up connection?
Answer: Modem
A walled garden refers to a browsing environment that controls the information and
Web sites the user is able to access. ISPS use this method in order to keep the user
navigating only specific areas of the Web.
84. Which of these terms refer to the technology that is used to effectively
double the data transfer speed?
Channel bonding refers to the technology that combines two telephone lines into a
single channel, effectively doubling the data transfer speeds. For example, bonding
two modems of 56Kbps together would give you a 112 Kbps Internet connection.
85. Which of these devices is installed in the computer to plug a network cable
coming from the modem?
A computer must have a network card installed to be able to plug a network cable
coming from the modem, router or gateway.
86. Which of these devices are used to send the data to a particular
destination?
Answer: Switch
A Switch learns about MAC address connected to each port and will only send
data on that port that is addressed to those MAC addresses.
87. What is the address given to each computer on the Internet known as?
Answer: IP address
88. Which of the following is not true about Internet access through satellites?
It is faster than dial-up but slower than DSL. It can be used anywhere around the
world and gets affected by rain and snow.
89. Which of the following is correct about Digital Subscriber Line?
A Digital Subscriber Line is always on and is faster than Dial-up. In DSL, Internet
and phone can be used in the same time.
90. What do we call the networking hardware that allows data to flow from
one discrete network to another?
Answer: Gateway
A gateway is a multi-use device that includes a modem and a router, all in one. It
allows data to flow from one discrete network to another.
91. Which of these form the basis of the ios type of internet connection?
Answer: Satellite
IoS stands for Internet over Satellite. It allows the user to access the Internet via a
satellite that orbits the earth.
92. Which of these software’s is necessary to view web pages on the internet?
93. What is the name given to the companies providing internet services?
Answer: ISP
ISP stands for Internet Service Providers. Internet Service Providers are companies
that connect the common public to the Internet services.
Answer: Router
95. Which among the following is the cheapest type of internet connection?
Answer: Dial-up
Dial-up internet connection is the cheapest method to connect to the Internet. But
it is a very slow connection and the quality is also not very good. The Internet
speeds range from 2400 bps to 56 Kbps.
Answer: DSL
DSL stands for digital subscriber line. It is a type of internet connection which is
always connected to the Internet. So, in this case, we don't have to dialup to
connect.
Answer: TCP
99. Which of the following layer of the OSI model is used by the TCP for its
operation?
TCP operates at the transport layer of the oSI model. TCP provides reliable
transport, in that if a segment is dropped, the sender can detect that drop and
retransmit that dropped segment.
Answer: FTP
FTP stands for File Transfer Protocol. It works at the Application layer. It enables
the uploading and downloading of files from a remote host.
101. Which of these is not correct about Trivial File Transfer Protocol?
Answer: 80
Answer: 25
SMTP Stands for Simple Mail Transfer Protocol. SMTP is a protocol that defines
how mail messages are sent between hosts. It uses port number 25 to send
messages.
Answer: 119
The Network News Transport Protocol or NNTP uses the port 119. NNTP is
similar to the SMTP protocol used for sending email messages, but it is designed
specifically for newsgroup articles.
Answer: UDP
TFTP or Trivial File Transfer Protocol makes use of UDP for data transport. Each
TFTP message is carried in separate UDP datagram.
106. Which of these protocols is used for monitoring networks and network
components?
Answer: SNMP
Answer: 32-bit
IPV4 uses 32-bit addresses. This limits the address space to 232 addresses. IPv4
addresses are written in the dot-decimal notation, which consists of four Octets.
108. Which of these protocols is used to login into a remote computer?
Answer: Telnet
Telnet is a protocol used to log in to remote Computers. terminals over the Internet
or a TCP/IP Computer network. Telnet uses the port 23.
109. Which of these protocols is used to retrieve email messages from a mail
server?
Answer: IMAP
Answer: 110
Answer: IGMP
Answer: LDAP
Answer: 161
The Simple Network Management Protocol (SNMP) is used to manage networks
which is used to monitor, configure and control network devices. It uses port
161/162.
Answer: NTP
The Network Time Protocol is used to synchronize the time of a computer client
or server to another server or reference time source such as a radio or satellite
receiver or modem.
Answer: ARP
The Address Resolution Protocol (ARP) is an Internet layer protocol that helps the
network Components find other devices in the same broadcast domain.
116. Which of these was the first vweb browser to handle all HTML 3
features?
Answer: UdiwwW
UdiWWW was the first web browser that was able to handle all HTML 3 features.
UdiWww was created for the UDINE Project (Universal Document Information
and Navigation Environment), which started in 1992.
Answer: 1995
Microsoft released the Internet Explorer version in the year 1995. By 1999,
Internet Explorer was owning 99% of the browser market.
Initial versions of Chrome use WebKit as the rendering engine. But Google
eventually forked it to create the Blink engine. Now all Chrome variants except
iOS use Blink.
119. Which of these web browsers has the largest market share presently,
across all platforms?
Answer: Chrome
As per W3Counter's browser stats for january 2019, Google Chrome has a 62%
worldwide browser market share across all platforms.
Answer: RAT K-
Meleon, Amaya and Konqueror are the names of web browsers which were in use
in the 90s. Amaya was considered a "lightweight'" browser.
121. Which of the following is the oldest web browser still in general use?
Answer: Lynx
Answer: 2008
Chrome or Google Chrome was first released in 2008 for Microsoft Windows, and
was later ported to LinuX, macOS, iOS, and Android.
Answer: Mozilla
Answer: Presto
Presto was developed by Opera Software for use in Opera. Its development was
stopped as Opera transitioned to Blink layout engine.
Answer: Spartan
Answer: 11
Microsoft Internet Explorer version 11 was the eleventh and final version of the
browser. It was officially released in 2013 for Windows 8.1.
127. Which of these was the first browser for the classic Mac operating
system?
Answer: Samnba
Macaws, also known as Samba, was the web browser launched in1992 which was
meant to run on Macintosh computers. It was the first web browser for any non-
Unix operating system.
Answer: Epic
Epic web browser was launched by a Bangalore- based software firm, Hidden
Reflex. Epic is based on the Mozilla platform.
129. Which of these layout engines was used in Internet Explorer 4? Answer:
Trident
Trident is a browser engine which was developed by Microsoft for use in the
Windows versions of Internet Explorer 4 to Internet Explorer 11.
The first web browser was called as WorldWideWeb. It was invented in 1990 by
Sir Tim Berners-Lee. It was later renamed to Nexus.
131. Which of these was the first browser to display images inline with text?
Answer: Mosaic
Mosaic was the first web browser to display images inline with text instead of
displaying images in a Separate window.
132. Which of these was the first web browser for Microsoft Windows?
Answer: Cello
Cello was the first web browser to run on the Microsoft Windows. Cello is an
early graphical web browser for Windows 3.1 and it was developed by Thomas R.
Bruce.
133. Which of these was the first browser to have a graphical user interface?
Answer: Erwise
Erwise was the first browser with a graphical user interface, developed as a student
project at Helsinki University of Technology and released in April 1992, but
discontinued in 1994
134. What was "Mosaic" in the initial history of World Wide Web?
Mosaic was one of the first web browsers and the first "popular" web browser with
a graphical user interface that could be operated by an average person. It was this
browser which accelerated the spread of the internet and resulted in internet boom
of 1990s.
Answer: 1994
first International Conference on the World-Wide We or WwW1 was also the first
meeting of World Wide Web Conference. It was held on May 25 to 27, 1994 in
Geneva, Switzerland.
137. The phrase "Cloud Computing" was first time used in context with a
project of which two organizations?
138. What are Software as a Service (Saas), Platform as a Service (Paas) and
Infrastructure as a Service (IaaS) in context with Cloud Computing?
Answer: Intel
Intel itself is not a could service provider. However, Intel powers cloud services
with compatible processors, networking components, and solid- state drives, along
with its rich portfolio of enabling technologies and solutions.
141. Which of the following is an open source platform for creating and
maintaining a cloud service?
Answer: Scalability
145. What is the name of Cloud developed by Institute for Development and
Research in Banking Technology?
A dialog box is a small area on a screen through which the user interacts with the
computer. User is either asked to provide information or commands using this. The
alerts also appear in this.
2. A file which has not been altered, compressed, or manipulated in any way
by the computer is called?
Araw file is a collection of unprocessed data. This is a file which is not altered or
manipulated. It is the original file that is generated initially.
Bandwidth refers to the amount of data that can be transmitted in a fixed amount
of time. For digital devices, the bandwidth is usually expressed in bits per second
(bps) or bytes per second.
6. Which among the following is the time period during which a computer is
malfunctioning or not operating correctly due to machine failures?
9."Don't be evil" was the informal corporate motto of which of the following
internet giants?
Answer: google
"Don't be evil" was used in Google's corporate code of conduct and was
considered to be an informal motto. However, it has been removed now off the
code of conduct.
10. Which of the following blogging platform was first launched by Pyra
Labs?
Answer: Blogger
Blogger is the platform founded by Pyra Labs in 1999. Google acquired it in 2003.
WordPress is a free and open-Source content management system by wordpress
foundation. Twitter is an American microblogging and social networking service
founded in 2006. 11. In the Windows XP, what does XP stands for? Answer:
Experience Windows XP is an operating system introduced in 2001. It is from
Microsoft's Windows. The "XP" in Windows XP stands for experience. Microsoft
called the XP release its one of the most important product.
12. News websites deliver customized 'feeds' of content to their readers via
RSS, which stands for:
Real Simple Syndication (RSS) is the term used to refer the collection of Web feed
formats. They provide updated or shared information in a standardized way. They
deliver customized 'feeds' to the customers.
Answer: 2014
Answer: Linkedin
Answer: PHP
PHP stands for Hypertext Preprocessor. It is a programming language primarily
designed for web development to create dynamic web pages.
Answer: Wikipedia
Answer: Stumbleupon
Social bookmarking website is a site where users share other content from the
Internet and rate and comment on the content. Stumbleupon and Digg are some
examples.
Webmail is a site that provides a e-mail service. Gmail, Yahoo and Hotmail are
some of the popular e-mail service providers.
An e-commerce site is a site offering goods and services for online sale and
enabling online transactions for such sales. Examples are Amazon.com,
Flipkart.com and Alibaba.com.
XML stands for Extensible Markup Language. It is a markup language that defines
a set of rules for encoding documents in a format which is both human-readable
and machine readable.
DOM means DoCument Object Model. It represents the page so that programs can
change the document structure, style, and content.
23. Which of the following language is designed specifically for Web site
animation?
Answer: Actionscript
Answer: China
26. Which of these companies is considered as one of the Big four technology
companies?
Answer: Facebook
Big Four technology companies of the world includes Google, Amazon, Apple and
Facebook. The Big Four are sometimes referred to as GAFA.
Answer: Microsoft
Microsoft launched Bing on June 1, 2009. On July 29, 2009, Yahoo! and Microsoft
agreed on a deal in which Yahoo! Search would be powered by Microsoft Bing
technology.
Answer: 1998
Google search engine was launched in 1998. It is the most visited website in the
world. It was founded by Larry Page and Sergey Brin.
Yandex is a Russian search engine. Quiho0360 belongs to China and Naver search
engine belongs to South Korea. AOL İS a web portal and online service provider
based in New York City.
Answer: California
which was launched in 1996, was the first smartphone launched by Nokia., It is
considered to be the second smartphone in the market following the HP OmníGo
700LX.
Answer: ios
iOS is developed by Apple Inc and it presently powers many of the Apple's mobile
devices, including the iPhone, iPad, and iPod Touch. 33. Which was the last
smartphone from Nokia? Answer: Nokia 808 Preview Symbian is a mobile
operating system which is now discontinued. The Nokia 808 Preview in 2012 was
officially the last smart phone from Nokia.
Answer: 2007
The first-generation iphone was launched in the year 2007. Since then many
models of iphone have been released with various new features.
Answer: Nougat
Android 7.0 is named as "Nougat It is the seventh major version of Android and
was officially released on August 22, 2016.
Answer: Google
Pixel is an android smartphone designed, developed and marketed by Google. It
was announced by Google in 2016 and served as the first smartphones in the
Google Pixel hardware line.
The Noia 7650 was the first Nokia phone with a built-in camera and thus its
imaging capabilities was widely marketed. It was introduced in 2001.
Answer: Karbonn
Answer: China
Answer: Spotify
Spotify is an audio streaming platform app. It was launched on 7th October 2008.
It provides music and podcasts from record labels and media companies.
Answer: Siri
Siri is a virtual assistant that is part of Apples mobile phones and gadgets. It uses
voice queries and a natural-language user interface to assist the Users.
43. Which of the following is not a gaming app?
Answer: Line
Line is a free android app for instant communications on electronic devices such as
smart phones, tablet computers, and personal Computers.
Answer: 2012
Google Play brought together the Android Market, Google Music, and the Google
eBook store under one brand and was launched on March 6, 2012.
Snapchat is a chat and messaging app that was created by Evan Spiegel, Bobby
Murphy, and Reggie Brown. It was launched in 2011.
Opera Mobile Store is a platform independent app store which was launched in
2011. It has mobile apps for ios, Java, BlackBerry 0S, Symbian, i0S, and Windows
Mobile, and Android based mobile phones.
Google Play store includes Google Play Books, Google Play Games, Google Play
Movies & TV, Google Play Music. It was launched in 2012.
48. Which was the Nokia's first smart phone running Windows operating
system?
Nokia Lumia 800 is a smart phone from Nokia which was Nokia's first device to
run the Windows Phone operating system.
Answer: allows the user to be heard only while the talk button is held
Push to talk, available on some mobile phones, is a feature that allows the user to
be heard only while the talk button is held. It is similar to a walkie-talkie.
A dialog box is a small area on a screen through which the user interacts with the
computer. User is either asked to provide information or commands using this. The
alerts also appear in this.
2. A file which has not been altered, compressed, or manipulated in any way
by the computer is called?
A raw file is a collection of unprocessed data. This is a file which is not altered or
manipulated. It is the original file that is generated initially.
3.Which among the following key is used for checking grammar and
spelling?
Answer: F7
F7 is the key to check grammar and spellings in a document. Ribbon at start also
can be used to check spellings.
Answer: 1985
Answer: Cntrl +Z
Answer: Experience
NTES Stands for New Technology File System. It is the file system that the
Windows NT operating system uses for storing and retrieving files on a hard disk.
Windows 1.0 does not allow overlapping windows but windows are tiled only.
Windows 2.03 changed the OS from tiled windows to overlapping windows.
Answer: Windows 95
Windows 95 was the first version of windows introduced support for native 32-bit
applications, plug and play hardware, preemptive multitasking, long file names of
up to 255 characters, and provided increased stability over its predecessors.
Answer: Windows NT
Windows NT was the first purely 32-bit version of Windows, whereas Windows
3.1x and Windows 9x, were 16-bit/32-bit hybrids.
Answer: 1985
Pressing the Windows Key and the letter 'D' together will minimize any
program/window that is on the screen at the time.
15. Which of these is the default text editor for Windows operating system?
Answer: Notepad
16. Which key combination can make the Windows operating system reboot?
The Start button allows the PC users to access their computer programs, start
applications, access device settings or shut down the computer.
The Start button was first introduced in Microsoft Windows 95 and has been
featured in all releases of Windows since then.
19. Which key is pressed during startup to advanced boot options in Windows
98?
Answer: F8
Pressing the F8 key or holding down the F8 key in Windows 98 during startup can
open a menu of advanced boot options.
Temporary Internet Files is a Microsoft Windows folder which contains Web page
content that is stored on your hard disk. Web browsers like Chrome, Edge etc. uses
this folder to cache pages and other multimedia content fromn visited websites.
Answer: Edge
Microsoft Edge is a web browser developed by Microsoft. It was first released for
Windows 10 and Xbox One in 2015. Later, it was released for Android and iOS in
2017.
Answer: Cortana
Recycle Bin in Windows is temporary storage for files that have been deleted but
not yet permanently erased from the file system.
24. Which was the first version of Windows made available for purchase from
the Windows Marketplace?
Answer: Windows Vista
Windows Vista was made available for purchase and download from the Windows
Marketplace. it was the first Windows to be made available through a digital
distribution platform.
25. Which of these keys combination will open the start menu in Windows?
When the Ctrl key is pressed with the Esc Key in Windows, it opens the start
menu. It is a shortcut method to launch the start menu.
26. What will happen if Shift + Delete key combination is pressed after
selecting a file in Windows?
Answer: The file gets deleted permanently When "Shift+Delete" keys are used
together after selecting any file from the PC, the file will get erased permanently
from the computer system.
Answer: Icon
Answer: 1987
Microsoft released the first version of Excel for the Mac OS in 1985, and the first
Windows version in November 1987. It is a spreadsheet editor.
Answer: MS Word
30. Which of these MS Office products is primarily used for note taking?
Answer: .mpp
Answer: MS Paint
Microsoft Paint is a simple graphics editor that comes with all versions of
Microsoft Windows. It is a part of MS Office family.
Drop box is a file hosting service that offers cloud storage, file synchronization,
personal cloud, and client software. It is operated by the US- based company Drop
box, Inc.
Open Office is a discontinued open-source office suite. Sun open-sourced the Open
Office software in July 2000 as a competitor to MS Office.
36. Which of the following software’s was not included in the first version of
MS Office?
Answer: MS Access
MS Office was announced in 1988 and the first version of Office contained
Microsoft Word, Microsoft Excel, and Microsoft PowerPoint.
Answer: MS Access
Office Lens, is an image scanner optimized for mobile devices. It captures the
document via the camera and then straightens the document portion of the image.
39. Which of these MS Office products is used to create slideshows?
Answer: MS PowerPoint
Answer: MS Excel
MS Excel a spreadsheet editor that was first released in 1985 for Mac Os. The first
Windows version (numbered 2.05 to line up with the Mac) was launched in
November 1987.
41. With which version of Microsoft Office, the MS OneNote became a core
component?
44. Which of these Microsoft Office apps can be used for conferences and
meetings in real time?
Microsoft Expression Web is an HTML editor and general web design software. It
is a component of the discontinued Expression Studio by Microsoft.
Answer: Visio
Page break can be manually inserted in the MS Word document by pressing SHIFT
+ ENTER key. It is same as using page break option from the insert tab.
49. Which of the following file extension is used in MS Word 2003?
Answer: .doc
DOC or doc is a filename extension for word processing documents which were
created in Microsoft Word 97 - 2003 versions.
Answer: WordArt
The text styling feature of MS Word is known as WordArt. It allows users to make
the text more noticeable and more flashy.
51. Which of the following key combination is used to create a new document
in MS Word?
Answer: Ctrl + N
Ctrl + N is the key combination used to create a new document in Microsoft Word.
Also, the new document can be created from the File option.
52. Which of these key shortcut will change the case of selected text in MS
word?
Answer: Shift + F3
When Shift+F3 key combination is pressed, it changes the case. Any selected text,
or the word upon which the toothpick cursor flashes gets affected when the Shift+
F3 is pressed.
53. Which menu option has the option to print document in MS Word?
Answer: File
Print and Print preview are given under the File menu in MS Word. Also, Ctrl + P
is a shortcut which lets the users print the current document.
54. What is the maximum font size available in MS Word from the dropdown
list?
Answer: 72
The maximum font size available in MS Word from the dropdown list is 72.
However, a greater size value for a font can be added manually.
Answer: Review
Selecting Restrict Editing provides authors with options to limit options within the
document. This option can also be accessed through the Review tab in the Protect
toolbox
58. Which key shortcut is used to move a Word to the right of the cursor?
Answer: Ctrl +>
Ctrl +> (right arrow) moves one word to the right. It is a shortcut for quick editing
to move the position of one word, Ctrl +
59. Which menu option is used to add Header and Footer in a document?
Answer: Insert
Insert tab is used to insert page breaks, tables, illustrations, links, header and footer,
text and symbols etc.
Answer: Insert
Pages can be numbered by clicking the Insert menu and then selecting Page
Numbers option. Various options are available for page numbering.
61. Which menu option in MS word has the 'Track Changes' feature?
Answer: Review
Track changes option can be turned on or off. It is available in the Review menu.
On the Review tab, in the Tracking group, the Track Changes button is available.
Various items such as Picture, Clipart, Charts etc. can be inserted in MS Word. All
these options are available from Insert menu in MS Word.
Answer: Ctrl + A
Ctrl + A is used to select the entire document. Ctrl + S is used to save the
document. Ctrl + E is used to centre align the document.
66. Which menu option in MS Excel has the option to sort the data?
Answer: Data
The Data menu option has the option to sort the data. The Data tab in MS Excel
contains the Sort & Filter group which can be used to sort the data.
68. Which is the correct formula for SUM function in MS Excel Answer:
=SUM (A1:A5)
The SUM function in MS Excel adds the arguments you enter in the SUM formula.
The correct example of SUM formula is =SUM A1:A5). LICO pursers &IT
Answer: .xls
XLS file extension icon is the default MS Excel file extension. XLS is a file
extension for a spreadsheet file format created by Microsoft for use with Microsoft
Excel.
Spelling, Thesaurus and Research tools are available in MS Excel. All these tools
are available under the Review menu of MS Excel.
74. Which of the key combination is used to move to the bottom of the column
in MS Excel?
When the Ctrl key is pressed with the Down Arrow, the last cell of the column
qets activated. It is a shortcut to move to the bottom of the column in MS Excel.
Answer: Ctrl +9
Ctrl + 9 is used to hide a selected row. When a row is selected and Ctrl +9 key is
pressed, the row gets hidden.
76. What is the use of 'Ctrl +;' key combination in MS Excel?
CTRL +; key combination inserts the current date in the selected cell. When the
Ctrl key is pressed with (semi colon) key, the current date gets inserted.
The current time can be inserted in an active cell by pressing 'Ctrl+ Shift + :'. The
Ctrl +; key combination inserts current date.
By pressing Ctrl + Space, all the cells of the active column gets selected. This a
shortcut to select all the cells in a column.
Ms Excel supports a wide variety of built-in functions that can be used when
building formulas. The Insert Function button is located on the Formula bar.
Answer: Shift + F2
Shift + F2 inserts a comment in MS Excel. When a cell is active, pressing Shift and
F2 button will allow entering comment in that cell.
MS Excel's AutoFill feature is used to fill cells with data that follows a pattern or
that is based on data in other cells. Microsoft Excel's AutoFill feature makes data
entry efficient.
When Shift andF11 key is pressed together, a new sheet is inserted in MS Excel. It
is a quick way to add a new sheet
Answer: Convert
The Convert function will convert miles into kilometers. Excel's convert function
("=CONVERT()") Converts a measurement from one unit to another.
CTRL + Shift + & is used to add a border to the selected cell in MS Excel. It is a
shortcut to add border to the active cell.
Transitions in slides are the motion effects that Occur in Slide Show view when
we move from one slide to the next during a presentation.
Answer: .ppt
A PPT file is an editable slide show created by Microsoft PowerPoint 2003. The
default file format in PowerPoint version 2007 or newer is.pptx.
All of the above files can be inserted in MS PowerPoint. On Home tab of the
ribbon, under Insert, click Picture > Picture from File. Navigate to the location of
the animated GIF you want to add
Answer: Insert
The option to add images in a slide is available under the Insert menu in the MS
PowerPoint. Various types of images can be inserted in MS PowerPoint.
Motion paths are animation effects that move slide objects in a sequence to tell an
effective story. It is available under the Animation menu.
F5 is used as the shortcut key tO view the slideshow in MS PowerPoint. Also, the
slideshow can be run from the slideshow menu.
Answer: Ctrl + K
Ctrl + K is used to insert a hyperlink in MS PowerPoint. When Ctrl and K keys are
pressed together, insert hyperlink dialog box opens up.
95. Which of these key shortcuts will change the case of the selected text?
Answer: Shift + F5
Shift + F5 shortcut changes the text case. When this key combination is pressed,
the case of the selected text changes.
Answer: Esc
ESC key is used to end the slideshow. It is a shortcut to end the current slideshow.
The F5 is used to start the slideshow.
"Fly in' is a custom animation effect in MS PowerPoint makes the Text or other
objects fly in a slide during MS PowerPoint presentation.
100. How can all the text in all the slides be selected in MS PowerPoint?
All the text in all the slides can be selected in MS PowerPoint by clicking Ctrl + A
in Outline view. All the slides can be selected by clicking Ctrl + A in Slides view.
101. What is the best way to add a background image to all the slides?
By editing the master slide, we can add a background image to all the slides. It
helps in giving a uniform appearance to all the slides.
Answer: Template
Answer: Placeholder
In Microsoft PowerPoint, placeholders are boxes with dotted borders that contain
content and reside within a slide layout.
Short text is a datatype which includes Text or combinations of text and numbers,
including numbers that do not require calculating.
Data can be exported the data from table, query, form, and report objects etc. The
option to export the data in MS Access is given under the External Data tab.
Databases in Access are composed of many objects but the major objects are
Tables, Queries, Forms and Reports.
110. Which function in MS Access gives the number of time intervals between
two specified dates?
Answer: DateDiff()
The Date Diff() Function is another very popular date/time function. The DateDiff
Function returns a Variant (long), specifying the number of time intervals between
two specified dates.
Answer: StrReverse()
The StrReverse() function reverses a string and returns the result. The format to
use this function is 'SELECT StrReverse("a string") AS StringReverse'.
112. Which of the following functions returns a string that contains the value
of an operating system environment variable?
Answer: Environ()
The Environ() function returns a string that contains the value of an operating
system environment variable:
Answer: IsNull()
The IsNull() function checks whether the expression is a Null value. This function
returns a Boolean value whether the value is true or false.
Answer: CurrentUser()
CurrentUser() is the MS Access function which return the current user. This
function returns the name of the current database user.
Answer: A RDBMS
Answer: Immediate If
The IIf() Function is an atbbreviation for "Immediate If" and this function
evaluates an expression as either true or false and returns a value for each.
Answer: 64
Answer: .accdb
Answer: 8 bytes
Currency data type includes currency values and numeric data used in
mathematical calculations involving data with one to four decimal places.
121. What is the shortcut key to switch between the field names and properties
panels in table design view?
Answer: F6
The F6 key is used to switch between the windows, or between design panes
properties / etc. in the Microsoft Access.
The Format Painter tool of MS Access is used to apply exactly the same
formatting to several controls repeatedly.
Answer: Fields
Answer: Deletes all records automatically when the record is deleted in the
parent table
Cascade Delete option means that if a record from one table is deleted,
corresponding records in the other table are also deleted.
Answer: abc@def.com
Answer: POP3
Answer: WhatsApp
Gmail, Yahoo, Rediff, Hotmail, Outlook are some of the email service providers.
WhatsApp is an instant messaging mobile application.
Answer: Attachments
132. Which do we call the dangerous programs that can get downloaded by
opening E-mail attachments?
Answer: Virus
Viruses can easily be transferred from one computer to another through sending
mails. This is the most common way used nowadays. They may Come as an
attachment along with the emails.
Answer: SPAM
Email spam, also known as junk email, is unsolicited messages sent in bulk by
email (spamming).Most email spam messages are commercial in nature.
134. Which of these folders in Gmail will contain The emails which are
composed but not yet sent?
Answer: Drafts
A draft is simply an email message which hasn't been yet sent. It's not the same
thing as an email waiting to be sent.
135. What does SMS stand for?
Answer: 160
Answer: 1992
The first-ever text message was sent December 3, 1992, by software engineer Neil
Papworth, to Vodafone director Richard Jarvis, who received the SMS on his
husky Orbitel 901 cell phone.
The First Text Message Celebrates 25 Years. The first text message was
transmitted Dec. 3, 1992. Engineer Neil Papworth typed "merry Christmas" on a
computer and sent the first SMS message to the cellphone of Vodafone director
Richard Jarvis
MMS can delivera variety of media, including up to forty seconds of video, one
image, a slideshow of multiple images, or audio.
141. What is the part of the email address before '@'symbol known as?
Answer: Username
The part before the @ symbol identifies the name of a mnailbox and is often the
username of the recipient, e.g., robertsmith. The part after the @ symbol (domain)
is a domain name.
In almost all email programs deleting an email message actually means moving it
to a special folder - typically called "trash" or "deleted items".
An Outbox is a place on a computer where copies of email messages that you are
going to send are kept.
Answer: 25 MB
Answer: Spam
Spam is any kind of unwanted, unsolicited digital communications. They are sent
in bulk. The Spam today is becoming a serious threat.
2. Now a days Wishing has become a criminal practice of using social
engineering over which of the following?
Answer: Phishing
4. Which among the following is the most common source of Viruses to the
hard disk of your computer?
Incoming emails is the most common source of Viruses to the hard disk of a
computer. Hackers are using e mail for attacking a computer. The incoming email
is the most venerable way.
5. Most of the internet banking sites provide which of the following feature to
reduce the risk of keystroke logging for the password entry?
Answer: Norton
9.What do we call the attack that focuses on capturing small packets from
the network transmitted by other computers and reading the data content?
Answer: Eavesdropping
10. What do we call the malicious computer programs that gains root or
administrative access to the computer?
Answer: Rootkits
XSS attacks use third-party web resources to run scripts in the victim's web
browser or scriptable application.
13. What do we call a malware that blocks access to the victim's data and
threatens to publish or delete it unless money is paid?
Ransom ware is a type of malware that blocks access to the victim's data and
threatens to publish or delete it unless a ransom is paid.
14. Which of these virus infects a software program and causes a series of
actions to begin automatically when the program is opened?
Answer: Worms
Worms differ from viruses in that they do not attach to a host file, but are self-
contained programs that propagate across networks and computers. It is a
standalone malware computer program that replicates itself in order to spread to
other computers.
Answer: A Dropper
18. What is the name of the attack which happens when a malefactor executes
a SQL query to the database via the input data from the client to server?
19. What is the attack called where the hackers look for insecure websites and
plant a malicious script into the source code?
Answer: IP Spoofing
21. Which of these malicious programs collect information about users and
sends the data to a remote user?
Answer: Spyware
22. What do we call the attack which is made against hash algorithms that are
used to verify the integrity of a message, software or digital signature?
Answer: Birthday attacks
Birthday attacks are made against hash algorithms that are used to verify the
integrity of a message, software or digital signature. The birthday attack refers to
the probability of finding two random messages that generate the same Message
Digest (MD) when processed by a hash function.
23. What are the viruses that rewrite themselves completely each time they are
to infect new executables, known as?
Code Red was a computer worm observed on the Internet in 2001 and it launched
DOS attack on White House's website. It attacked computers running Microsoft's
IIS web server.
4 The terms "push and pull services in context with the Banking are used in
which among the following generally?
ct present transaction S payment card risen ate niter the catch deer s not Coaly
resent the c2rd for American’s visual Editor zee time that an orcas given and ate at
person using record online resign barking an use this
nervy an asset s red Dyadic arty on beach two other parts 2 coerce tic to asset of
merchant before
7. How may banks are promoting the National Payments Corporation of India
(NPCaj?
Answer 19
Real-time gross settlement (RTGS) systems are specialist funds transfer systems
where the transfer of money takes place from one bank to any other bank on a "real
time".
12. Which of the following money transfer system involves waiting period?
Answer: NEFT Peers
NEFT transfers funds in timed batches, while RTGS and IMPS are real-time
transfer modes. NEFT stands for National Electronic Funds Transfer.
Answer: abc@sbi
You can make direct bank payments to anyone on UPI using their UPI ID or
scanning their QR with the BHIM app or via their account numbers. Money can be
requested through the BHIM app from UPI ID. Balance in the account can be
checked too.
Answer:
IMPS is available 24*7 whereas NEFT is available during NEFT business hours
IMPS is managed by NPCI whereas NEFT is managed by RBI. IMPS is available
24*7 whereas NEFT is available during NEFT business hours. IMPS is a real time
transfer system whereas NEFT İs not.
17. Which of the following are the features of Core banking Solutions?
Plastic money is the generic term for all types of bank cards, credit cards, debit
cards, smart cards, etc.
Answer: 4 digits
Usually all the debit cards, credit cards and mobile phones require a pin to unlock
them. The length of ATM card is four digits.
20. Which of the following can be used to access the E-banking services?
Answer: All of the above
SSL stands for Secure Sockets Layer. The usage of SSL technology ensures that all
data transmitted between the web server and brOwser remains encrypted.
money is deducted from the account when performing a transaction A debit card is
similar to a credit card, but unlike a credit card, the money is immediately
transferred directly from the cardholder's bank account when performing a
transaction.
Brown Label ATM is sharing cost concept. In Brown Label ATM hardware is
owned by service provider, but cash management and network connectivity is
provided by sponsor bank.
24. What is the Indian government's initiative to link Jan Dhan accounts,
Mobile numbers and Aadhar cards of Indians called as?
JAM (short for Jan Dhan-Aadhaar-Mobile) trinity refers to the government of India
initiative to link Jan Dhan accounts, Mobile numbers and Aadhar cards of Indians
to plug the leakages of government Subsidies.
Answer: NPCI
The BHIM mobile app was developed by the National Payments Corporation of
India (NPCI). It is based on the Unified Payments Interface (UPI).
29. Which of the following is not true about Bharat Interface for Money
(BHIM) app?
Bharat Interface for Money (BHIM) provides fast, secure, reliable medium to make
digital payments through your mobile phone using UPI (Unified Payment
Interface) platform via Mobile App and USSD (Unstructured Supplementary
Service Data) platform via *99# service.
30. What is the name of the new Blockchain-based payment platform of the
National Payments Corporation of India (NPCI)?
Answer: Vajra
The National Payments Corporation of India (NPCI) is set to launch its new block-
chain based platform, which is named as Vajra'. The new payment platform will be
based on 'Distributed Ledger Technology' (DLT). The platform is expected to make
the payments secure and the transactions would be stored in a decentralized
database. The bank nodes after receiving the requests from the Unified Payments
Interface (UPI) will process them on the Vera platform.
31. Which of the following is most correct word for accessing secure online
banking functions through a mobile device's browser?
32. What is the code devised to access mobile banking without internet
connection via the USSD?
Answer: *99#
Access points are places or capabilities that are used to initiate or receive a
payment. Access points can include bank branch offices, ATMs, terminals at the
POS, agent outlets, mobile phones, and computers.
34. What is the USSD code for Query Service on Aadhaar Mapper (QSAM)?
Answer: *99*99#
OSAM (Query Service on Aadhaar Mapper) service helps user in knowing their
Aadhaar Seeding status with their bank account. This service provided by NPCI
can be availed by dialing *99*99#. With this, the user can know whether his/her
AADHAAR number is seeded/linked to any bank account number or not. If yes,
then with which bank and when it was last updated.
35. Mobile Money Identifier is a 7 digit number that facilitates fund transfer
in mobile banking. Which of these bodies issues MMID?
Answer: Banks
Mobile Money Identifier is a 7 digit number, issued by banks. MMID is one of the
input which when clubbed with mobile number facilitates fund transfer.
Combination of Mobile no. & MMID is uniquely linked with an Account number
and helps in identifying the beneficiary details. Different MMIDS can be linked to
same Mobile Number.