1.
WHAT IS THE OUTPUT OF THE FORMULA =CONCATENATE ("O LEVEL","M1R5")?
2.
IP address are divided into sections of ____each ?
4.
which of the following is not a typical characteristic of an ethical hacker?
5.
twitter handles are Preceeded by the symbol?
6.
multipurpose internet mail extension (mime)was developed?
7.
what is the color of 500 rupees note?
8.
RuPay debit card is similar to ?
9.
which of the correct formula in libreoffice calc?
10.
SERVERS ARE THE COMPUTERS THAT ?
12.
aeps is a bank led model which allow online interoperable financial inclusion transaction at?
13.
which bank launched first rupay atm and micro atm card with aadhaar number?
14.
what is the default font name in libreoffice writer?
15.
WHAT IS THE MAXIMUM NUMBER OF CELLS IN CALC SPREADSHEET?
16.
keyloggers are a form of?
17.
if the address changes after copying the formula the address in known as?
18.
what type of computers are client computers (most of the time) in a client server system?
19.
which operation is required to move file or folder from one location to another location?
20.
AT THE PRESENT SCENARIO HUB IS REPLACED BY?
21.
IN LIBREOFFICE IMPRESS IN ORDER TO SEE ALL THE SLIDES ON ONE SCREEN USE?
22.
a software that searches through a database of web pages for particular information is known as?
23.
___IS THE EXCHANGE OF COMPUTER STORED MESSAGES BY TELECOMMUNICATION ?
24.
WHAT IS THE TERM USED FOR TALKING ON NET WITH THE HELP OF TYPED TEXT?
25.
THE VERY NEW VIDEO SHARING SERVICE LAUNCHED BY FACEBOOK IS?
26.
ON TWITTER TRENDING TOPICS ARE THOSE THAT ARE?
27.
cpu reads the information from secondary memory
29.
what will be the output of the formula =count (b1..b3)? where b1=5,b2=4,b3=6?
30.
TO Work in C2c e- commerce which of the following is required?
31.
WHICH OF THE FOLLOWING IS THE TYPE OF SOFTWARE THAT HAS SELF REPLICATING SOFTWARE THAT CAUSES?
32.
WHICH ONE IS THE INVALID SIZE OF CACHE MEMORY ?
34.
WHAT IS THE FULL FORM OF BCD?
35.
suzuki buys tires by mrf what will be the relationship between them?
36.
what is the most important activity in system hacking?
37.
IN A NETWORK WORKSTATION IS A ?
38.
the indian rupee symbol ~ officially adopted in?
39.
=round (1363.45,-2) returns in libreoffice calc?
40.
which of the following is a class of computer threat?
41.
in aeps which of the following input determines the bank of the customer ?
42.
HOW MANY LANGUAGES DOES UMANG APP SUPPORT?
43.
WHAT IS THE MAXIMUM AMOUNT THAT CAN BE TRANSFERRED FROM UPI?
44.
which one is not a type of memory?
45.
WHICH OF THE FOLLOWING CAN BE USED FOR USSD SERVICE?
46.
in aeps unique id and __is used for authentication purpose?
47.
what does e stands for in aeps?
49.
WHAT IS THE MINIMUM BANDWIDTH REQUIRED OF BROADBAND CONNECTION?
50.
WHICH IS A MOBILE SOCIAL NETWORK?
51.
credit card are a convenient substitute for?
52.
which of the following feature is currently not present in aeps?
53.
output of the calc expression is =100/10/ 2?
54.
PEERS ARE THE COMPUTERS THAT?
56.
what is direct benefit transferDBT)
57.
which of the following belongs to systems software?
58.
sniffing is used to perform___ fingerprinting?
59.
___is a program that translates mnemonic statements into executable instructions?
60.
ETHERNET IS ___ TECHNOLOGY ?
61.
which topology is used by FDDI?
62.
WHAT IS THE COLLOQUIAL NAME FOR PAYPAL?
63.
credit card is an essential component of ?
64.
WHAT IS VALIDITY PERIOD OF CHEQUE?
65.
WHEN DIGILOCKER WAS LAUNCHED?
66.
ON TWITTER TRENDING TOPICS ARE PRECEEDED BY THE SYMBOL?
67.
which software browse the internet in a systematic manner?
69.
credit card was invented by__?
71.
what is full form of nuup?
72.
WHICH OF THE FOLLOWING IS FASTEST MEMORY?
74.
what is the purpose of denial of service attack?
75.
WHAT IS THE MEANING OF B IN BFD IN AEPS?
76.
WHAT IS THE RESULT OF THE FORMULA =MAX (B1:B3) +MIN (B1:B3)?
77.
the maximum number of slide can be printed on a4 size page?
78.
minimum amount in rtgs can be transfer?
82.
digilocker app provides storage space?
83.
WHAT IS THE SHORTCUT KEY OF FULL SCREEN?
84.
WHAT WILL BE THE RESULT OF THE FORMULA ="HELLO"& ""&"WORLD"?
85.
surgeons can perform delicate operations by manipulating devices through computers instead of manually this technology is known as?
86.
EXTENSION OF LIBREOFFICE CALC SPREADSHEET?
87.
what will be the value of=counta(17,57,7,"a","b","r")?
88.
THIS IS NOT A BENEFIT OF BIG DATA ANALYTICS?
89.
what does n mean in umang app?
90.
instant messenger is related to ?
91.
combinations of white hat hackers and black hat hackers are known?
92.
HOW MANY PHOTOS CAN BE UPLOADED ON FACEBOOK AT A TIME ?
93.
alignment buttons are available on the toolbar in libreoffice impress?
94.
WHAT IS THE SIZE OF 500 NOTE IN TODAY?
95.
which key is used with the control to create a new line or paragraph inside the cell of libreoffice calc?
96.
iin institution identification number is a digit number?
97.
WHAT DOES THE LETTER 'P' STAND FOR IN THE TERM OF AEPS?
98.
which is required for the internet connection ?
99.
the ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called?