1.
WHICH OF THE FOLLOWING IS THE TYPE OF SOFTWARE THAT HAS SELF REPLICATING SOFTWARE THAT CAUSES?
2.
WHAT IS THE FULL FORM OF BCD?
6.
which of the following feature is currently not present in aeps?
7.
multipurpose internet mail extension (mime)was developed?
8.
which of the correct formula in libreoffice calc?
9.
a software that searches through a database of web pages for particular information is known as?
10.
WHAT IS THE OUTPUT OF THE FORMULA =CONCATENATE ("O LEVEL","M1R5")?
11.
which key is used with the control to create a new line or paragraph inside the cell of libreoffice calc?
12.
WHAT IS THE MEANING OF B IN BFD IN AEPS?
14.
THE VERY NEW VIDEO SHARING SERVICE LAUNCHED BY FACEBOOK IS?
15.
surgeons can perform delicate operations by manipulating devices through computers instead of manually this technology is known as?
16.
EXTENSION OF LIBREOFFICE CALC SPREADSHEET?
17.
WHAT IS THE MAXIMUM NUMBER OF CELLS IN CALC SPREADSHEET?
19.
which is required for the internet connection ?
20.
instant messenger is related to ?
21.
HOW MANY LANGUAGES DOES UMANG APP SUPPORT?
22.
SERVERS ARE THE COMPUTERS THAT ?
23.
what does n mean in umang app?
24.
what type of computers are client computers (most of the time) in a client server system?
25.
THIS IS NOT A BENEFIT OF BIG DATA ANALYTICS?
26.
WHAT IS THE COLLOQUIAL NAME FOR PAYPAL?
27.
alignment buttons are available on the toolbar in libreoffice impress?
29.
HOW MANY PHOTOS CAN BE UPLOADED ON FACEBOOK AT A TIME ?
30.
suzuki buys tires by mrf what will be the relationship between them?
31.
WHICH ONE IS THE INVALID SIZE OF CACHE MEMORY ?
32.
ETHERNET IS ___ TECHNOLOGY ?
35.
IP address are divided into sections of ____each ?
36.
the ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called?
37.
WHAT WILL BE THE RESULT OF THE FORMULA ="HELLO"& ""&"WORLD"?
38.
cpu reads the information from secondary memory
40.
the indian rupee symbol ~ officially adopted in?
42.
in aeps unique id and __is used for authentication purpose?
43.
twitter handles are Preceeded by the symbol?
44.
credit card was invented by__?
45.
WHAT IS THE MAXIMUM AMOUNT THAT CAN BE TRANSFERRED FROM UPI?
46.
digilocker app provides storage space?
47.
WHAT IS VALIDITY PERIOD OF CHEQUE?
48.
output of the calc expression is =100/10/ 2?
49.
what is full form of nuup?
51.
credit card is an essential component of ?
52.
which topology is used by FDDI?
53.
=round (1363.45,-2) returns in libreoffice calc?
54.
which of the following belongs to systems software?
55.
which of the following is a class of computer threat?
56.
AT THE PRESENT SCENARIO HUB IS REPLACED BY?
57.
WHAT DOES THE LETTER 'P' STAND FOR IN THE TERM OF AEPS?
58.
___IS THE EXCHANGE OF COMPUTER STORED MESSAGES BY TELECOMMUNICATION ?
59.
IN LIBREOFFICE IMPRESS IN ORDER TO SEE ALL THE SLIDES ON ONE SCREEN USE?
60.
WHAT IS THE SHORTCUT KEY OF FULL SCREEN?
61.
RuPay debit card is similar to ?
62.
WHICH OF THE FOLLOWING IS FASTEST MEMORY?
63.
minimum amount in rtgs can be transfer?
65.
sniffing is used to perform___ fingerprinting?
66.
ON TWITTER TRENDING TOPICS ARE PRECEEDED BY THE SYMBOL?
67.
WHAT IS THE SIZE OF 500 NOTE IN TODAY?
68.
what is the default font name in libreoffice writer?
69.
WHEN DIGILOCKER WAS LAUNCHED?
70.
TO Work in C2c e- commerce which of the following is required?
71.
WHAT IS THE RESULT OF THE FORMULA =MAX (B1:B3) +MIN (B1:B3)?
72.
iin institution identification number is a digit number?
73.
credit card are a convenient substitute for?
74.
which operation is required to move file or folder from one location to another location?
76.
PEERS ARE THE COMPUTERS THAT?
77.
in aeps which of the following input determines the bank of the customer ?
78.
WHICH OF THE FOLLOWING CAN BE USED FOR USSD SERVICE?
79.
___is a program that translates mnemonic statements into executable instructions?
80.
which of the following is not a typical characteristic of an ethical hacker?
81.
what will be the output of the formula =count (b1..b3)? where b1=5,b2=4,b3=6?
82.
combinations of white hat hackers and black hat hackers are known?
83.
what is the color of 500 rupees note?
84.
what will be the value of=counta(17,57,7,"a","b","r")?
85.
WHICH IS A MOBILE SOCIAL NETWORK?
86.
the maximum number of slide can be printed on a4 size page?
87.
which one is not a type of memory?
88.
what does e stands for in aeps?
89.
keyloggers are a form of?
90.
which software browse the internet in a systematic manner?
91.
if the address changes after copying the formula the address in known as?
92.
ON TWITTER TRENDING TOPICS ARE THOSE THAT ARE?
93.
aeps is a bank led model which allow online interoperable financial inclusion transaction at?
94.
WHAT IS THE TERM USED FOR TALKING ON NET WITH THE HELP OF TYPED TEXT?
95.
WHAT IS THE MINIMUM BANDWIDTH REQUIRED OF BROADBAND CONNECTION?
96.
what is the most important activity in system hacking?
97.
which bank launched first rupay atm and micro atm card with aadhaar number?
98.
IN A NETWORK WORKSTATION IS A ?
99.
what is direct benefit transferDBT)
100.
what is the purpose of denial of service attack?