Nainital Bank MT Computer Knowledge Questions & Answers: Candidates who are searching for the Nainital Bank MT Computer Knowledge MCQ can have a look at this article. We know that many of you guys will be preparing from now itself for the Nainital Bank Management Trainee post. As there will be high competition it will be wise for you guys to be well prepared in advance. And that is where this article about the Nainital Bank MT Computer Knowledge Questions will come to help you.
Nainital Bank MT Computer Knowledge Questions & Answers
The Nainital Bank MT Computer Knowledge Quiz is created in the hope that candidates who will be appearing for the written examination in the coming few days will utilize it for their preparation. The Computer Knowledge Questions for Nainital Bank MT that you find here are collected on the basis of the syllabus topics issued by the officials. So, you guys can surely consider these questions as a reference and prepare well for the exam.
1. The first computers were programmed using ___________.
A. Machine language
B. Assembly language
C. Source code
D. Object code
E. None of these
Correct Answer: A
2. ___________ shortcut key is used to create a new folder in MS Windows.
A. Ctrl + N
B. Right Click Button + Q + Enter
C. Ctrl + Shift + N
D. Ctrl + W + Shift
E. Right Click Button + F + Enter
Correct Answer: C
3. Which of the following topology have a central controller or hub?
A. Ring
B. Mesh
C. Bus
D. Star
E. None of these
Correct Answer: D
4. ___________ is a set of rules computers use to talk to each other.
A. DOS command
B. Protocol
C. Antina
D. HTML
E. None of these
Correct Answer: B
5. Which of the following is an intersection of a row and column in a spreadsheet?
A. Worksheet
B. Address
C. Formula
D. Cell
E. None of these
Correct Answer: D
6. ___________is a self-contained step-by- step set of operations to be performed.
A. Network topology
B. Algorithm
C. Utility software
D. System Software
E. Application software
Correct Answer: B
7. What are programs such as Microsoft Edge that serve as navigable windows into the Web called as?
A. Windows Navigator
B. Seach Engine
C. Networks
D. Internet
E. Web browsers
Correct Answer: E
8. ___________shortcut key use to close the current window.
A. Alt + F7
B. Shift + F4
C. CRLT + F6
D. Alt + F3
E. None of these
Correct Answer: E
9. What is the use of “,” symbol in Ms EXCEL?
A. it is an intersection operator
B.allows you to make one reference for multiple cells located between 2 cells
C. is used to separate arguments in Excel spreadsheet formulas
D. For Sum of two cells
E. None of these
Correct Answer: C
10. In computer, EDI stands for what?
A. Explore Data Image
B. E-mail Data Interchange
C. Exchange digital image
D. Electronic Data Interchange
E. Electronic digital Interchange
Correct Answer: D
11. What type of web technology creates an online community where people can make statements and
others can read and respond to those statements?
A. ASP
B. I-Journal
C. Podcast
D. Blog
E. Cell
Correct Answer: D
12. ___________network devices are also called a concentrator.
A. Wi-fi
B. Router
C. Social
D. Antina
E. Hub
Correct Answer: E
13. Internet access by transmitting digital data over the wires of a local telephone network is provided
by:
A. MODEM
B. digital subscriber line
C. digital signal line
D. leased line
E. Router
Correct Answer: B
14. Portrait and Landscape are ___________.
A. Page Orientation
B. page layout
C. page design
D. page size
E. page view
Correct Answer: A
15. ___________is a technique used to gain unauthorized access to computers, whereby the intruder
sends messages to a computer with an address indicating that the message is coming from a trusted
host?
A. Identity Theft
B. Phishing
C. IPPodcast
D. IP Spoofing
E. Pharming
Correct Answer: D
16. Hyperlink is a/an ___________.
A. collection or directory of web pages.
B. input type for multimedia files.
C.text or image that you can click on to jump to a new document/page.
D. home page of a site.
E. None of these
Correct Answer: C
17. The main webpage of a website is also known as –
A. Icebreaker Page
B. Home Page
C. First Page
D. Contents Page
E. Introduction Page
Correct Answer: A
18. EBCDIC code can support ___________different representation of characters.
A. 149
B. 1024
C. 256
D. 32
E. 16
Correct Answer: C
19. ___________ is used for Unauthorized copying of software to be used for personal gain instead of
personal backups.
A. program looting
B. software piracy
C. program thievery
D. data snatching
E. data looting
Correct Answer: B
20. Which of the following topologies has the highest reliability?
A. Bus topology
B. Ring topology
C. Star topology
D. Square topology
E. Mesh topology
Correct Answer: E