1.
WHAT IS THE MEANING OF B IN BFD IN AEPS?
2.
HOW MANY LANGUAGES DOES UMANG APP SUPPORT?
3.
WHAT IS THE SIZE OF 500 NOTE IN TODAY?
4.
WHAT IS THE SHORTCUT KEY OF FULL SCREEN?
5.
WHEN DIGILOCKER WAS LAUNCHED?
6.
multipurpose internet mail extension (mime)was developed?
7.
which operation is required to move file or folder from one location to another location?
8.
instant messenger is related to ?
9.
suzuki buys tires by mrf what will be the relationship between them?
10.
in aeps which of the following input determines the bank of the customer ?
11.
IN LIBREOFFICE IMPRESS IN ORDER TO SEE ALL THE SLIDES ON ONE SCREEN USE?
12.
which key is used with the control to create a new line or paragraph inside the cell of libreoffice calc?
14.
minimum amount in rtgs can be transfer?
16.
THE VERY NEW VIDEO SHARING SERVICE LAUNCHED BY FACEBOOK IS?
17.
what is direct benefit transferDBT)
18.
RuPay debit card is similar to ?
19.
WHAT IS THE MAXIMUM NUMBER OF CELLS IN CALC SPREADSHEET?
20.
which bank launched first rupay atm and micro atm card with aadhaar number?
21.
THIS IS NOT A BENEFIT OF BIG DATA ANALYTICS?
23.
WHAT WILL BE THE RESULT OF THE FORMULA ="HELLO"& ""&"WORLD"?
24.
WHICH OF THE FOLLOWING IS THE TYPE OF SOFTWARE THAT HAS SELF REPLICATING SOFTWARE THAT CAUSES?
25.
IP address are divided into sections of ____each ?
26.
EXTENSION OF LIBREOFFICE CALC SPREADSHEET?
27.
___IS THE EXCHANGE OF COMPUTER STORED MESSAGES BY TELECOMMUNICATION ?
28.
credit card is an essential component of ?
29.
iin institution identification number is a digit number?
30.
what is the most important activity in system hacking?
31.
what will be the output of the formula =count (b1..b3)? where b1=5,b2=4,b3=6?
32.
if the address changes after copying the formula the address in known as?
33.
the ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called?
35.
WHAT IS THE COLLOQUIAL NAME FOR PAYPAL?
36.
WHICH ONE IS THE INVALID SIZE OF CACHE MEMORY ?
38.
ETHERNET IS ___ TECHNOLOGY ?
39.
TO Work in C2c e- commerce which of the following is required?
40.
which of the following is not a typical characteristic of an ethical hacker?
41.
=round (1363.45,-2) returns in libreoffice calc?
43.
what is the default font name in libreoffice writer?
44.
credit card are a convenient substitute for?
45.
output of the calc expression is =100/10/ 2?
46.
in aeps unique id and __is used for authentication purpose?
47.
ON TWITTER TRENDING TOPICS ARE THOSE THAT ARE?
48.
what type of computers are client computers (most of the time) in a client server system?
49.
keyloggers are a form of?
51.
what is the purpose of denial of service attack?
52.
what does e stands for in aeps?
53.
PEERS ARE THE COMPUTERS THAT?
54.
twitter handles are Preceeded by the symbol?
55.
IN A NETWORK WORKSTATION IS A ?
56.
what is full form of nuup?
57.
WHICH IS A MOBILE SOCIAL NETWORK?
58.
SERVERS ARE THE COMPUTERS THAT ?
59.
___is a program that translates mnemonic statements into executable instructions?
60.
ON TWITTER TRENDING TOPICS ARE PRECEEDED BY THE SYMBOL?
61.
WHAT IS THE MAXIMUM AMOUNT THAT CAN BE TRANSFERRED FROM UPI?
62.
WHICH OF THE FOLLOWING IS FASTEST MEMORY?
63.
which software browse the internet in a systematic manner?
64.
digilocker app provides storage space?
65.
WHAT IS THE TERM USED FOR TALKING ON NET WITH THE HELP OF TYPED TEXT?
66.
alignment buttons are available on the toolbar in libreoffice impress?
68.
WHAT IS THE OUTPUT OF THE FORMULA =CONCATENATE ("O LEVEL","M1R5")?
69.
WHAT IS THE RESULT OF THE FORMULA =MAX (B1:B3) +MIN (B1:B3)?
71.
which is required for the internet connection ?
72.
surgeons can perform delicate operations by manipulating devices through computers instead of manually this technology is known as?
73.
aeps is a bank led model which allow online interoperable financial inclusion transaction at?
74.
what is the color of 500 rupees note?
76.
WHICH OF THE FOLLOWING CAN BE USED FOR USSD SERVICE?
77.
WHAT IS THE MINIMUM BANDWIDTH REQUIRED OF BROADBAND CONNECTION?
78.
cpu reads the information from secondary memory
79.
HOW MANY PHOTOS CAN BE UPLOADED ON FACEBOOK AT A TIME ?
80.
combinations of white hat hackers and black hat hackers are known?
81.
the indian rupee symbol ~ officially adopted in?
82.
a software that searches through a database of web pages for particular information is known as?
83.
which of the following belongs to systems software?
84.
which of the following is a class of computer threat?
85.
what will be the value of=counta(17,57,7,"a","b","r")?
86.
what does n mean in umang app?
87.
WHAT DOES THE LETTER 'P' STAND FOR IN THE TERM OF AEPS?
88.
credit card was invented by__?
89.
which of the following feature is currently not present in aeps?
90.
AT THE PRESENT SCENARIO HUB IS REPLACED BY?
92.
WHAT IS THE FULL FORM OF BCD?
93.
which one is not a type of memory?
94.
the maximum number of slide can be printed on a4 size page?
95.
WHAT IS VALIDITY PERIOD OF CHEQUE?
96.
which of the correct formula in libreoffice calc?
98.
sniffing is used to perform___ fingerprinting?
100.
which topology is used by FDDI?