1.
cpu reads the information from secondary memory
2.
THIS IS NOT A BENEFIT OF BIG DATA ANALYTICS?
3.
WHAT IS THE RESULT OF THE FORMULA =MAX (B1:B3) +MIN (B1:B3)?
4.
what is the color of 500 rupees note?
5.
what will be the output of the formula =count (b1..b3)? where b1=5,b2=4,b3=6?
6.
=round (1363.45,-2) returns in libreoffice calc?
7.
what type of computers are client computers (most of the time) in a client server system?
8.
minimum amount in rtgs can be transfer?
9.
HOW MANY PHOTOS CAN BE UPLOADED ON FACEBOOK AT A TIME ?
10.
WHAT IS THE SHORTCUT KEY OF FULL SCREEN?
11.
which of the correct formula in libreoffice calc?
12.
twitter handles are Preceeded by the symbol?
13.
which one is not a type of memory?
14.
which of the following is a class of computer threat?
15.
ON TWITTER TRENDING TOPICS ARE PRECEEDED BY THE SYMBOL?
16.
WHICH ONE IS THE INVALID SIZE OF CACHE MEMORY ?
17.
IP address are divided into sections of ____each ?
18.
IN A NETWORK WORKSTATION IS A ?
19.
credit card was invented by__?
21.
what is direct benefit transferDBT)
22.
RuPay debit card is similar to ?
23.
which key is used with the control to create a new line or paragraph inside the cell of libreoffice calc?
24.
EXTENSION OF LIBREOFFICE CALC SPREADSHEET?
25.
TO Work in C2c e- commerce which of the following is required?
27.
WHICH OF THE FOLLOWING IS FASTEST MEMORY?
28.
WHAT IS THE FULL FORM OF BCD?
29.
THE VERY NEW VIDEO SHARING SERVICE LAUNCHED BY FACEBOOK IS?
30.
which of the following is not a typical characteristic of an ethical hacker?
31.
what does e stands for in aeps?
32.
which is required for the internet connection ?
33.
ON TWITTER TRENDING TOPICS ARE THOSE THAT ARE?
34.
WHAT IS THE MINIMUM BANDWIDTH REQUIRED OF BROADBAND CONNECTION?
36.
aeps is a bank led model which allow online interoperable financial inclusion transaction at?
37.
in aeps unique id and __is used for authentication purpose?
38.
___IS THE EXCHANGE OF COMPUTER STORED MESSAGES BY TELECOMMUNICATION ?
39.
credit card is an essential component of ?
40.
multipurpose internet mail extension (mime)was developed?
41.
output of the calc expression is =100/10/ 2?
42.
in aeps which of the following input determines the bank of the customer ?
44.
WHICH IS A MOBILE SOCIAL NETWORK?
45.
instant messenger is related to ?
47.
what does n mean in umang app?
48.
what will be the value of=counta(17,57,7,"a","b","r")?
49.
WHAT DOES THE LETTER 'P' STAND FOR IN THE TERM OF AEPS?
50.
WHAT IS THE OUTPUT OF THE FORMULA =CONCATENATE ("O LEVEL","M1R5")?
51.
HOW MANY LANGUAGES DOES UMANG APP SUPPORT?
52.
a software that searches through a database of web pages for particular information is known as?
53.
the maximum number of slide can be printed on a4 size page?
54.
which of the following belongs to systems software?
55.
WHAT IS THE MAXIMUM AMOUNT THAT CAN BE TRANSFERRED FROM UPI?
56.
WHAT WILL BE THE RESULT OF THE FORMULA ="HELLO"& ""&"WORLD"?
57.
WHAT IS THE MAXIMUM NUMBER OF CELLS IN CALC SPREADSHEET?
58.
SERVERS ARE THE COMPUTERS THAT ?
59.
which software browse the internet in a systematic manner?
61.
the indian rupee symbol ~ officially adopted in?
62.
sniffing is used to perform___ fingerprinting?
65.
WHAT IS THE SIZE OF 500 NOTE IN TODAY?
66.
what is full form of nuup?
67.
WHAT IS THE COLLOQUIAL NAME FOR PAYPAL?
68.
ETHERNET IS ___ TECHNOLOGY ?
69.
credit card are a convenient substitute for?
71.
WHICH OF THE FOLLOWING IS THE TYPE OF SOFTWARE THAT HAS SELF REPLICATING SOFTWARE THAT CAUSES?
72.
surgeons can perform delicate operations by manipulating devices through computers instead of manually this technology is known as?
73.
which bank launched first rupay atm and micro atm card with aadhaar number?
74.
which operation is required to move file or folder from one location to another location?
75.
what is the purpose of denial of service attack?
76.
alignment buttons are available on the toolbar in libreoffice impress?
77.
WHAT IS THE TERM USED FOR TALKING ON NET WITH THE HELP OF TYPED TEXT?
78.
if the address changes after copying the formula the address in known as?
80.
the ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called?
81.
WHICH OF THE FOLLOWING CAN BE USED FOR USSD SERVICE?
82.
IN LIBREOFFICE IMPRESS IN ORDER TO SEE ALL THE SLIDES ON ONE SCREEN USE?
83.
WHEN DIGILOCKER WAS LAUNCHED?
84.
what is the most important activity in system hacking?
85.
digilocker app provides storage space?
86.
AT THE PRESENT SCENARIO HUB IS REPLACED BY?
88.
combinations of white hat hackers and black hat hackers are known?
91.
which of the following feature is currently not present in aeps?
92.
what is the default font name in libreoffice writer?
93.
WHAT IS THE MEANING OF B IN BFD IN AEPS?
94.
PEERS ARE THE COMPUTERS THAT?
95.
which topology is used by FDDI?
96.
WHAT IS VALIDITY PERIOD OF CHEQUE?
97.
keyloggers are a form of?
98.
___is a program that translates mnemonic statements into executable instructions?
99.
suzuki buys tires by mrf what will be the relationship between them?
100.
iin institution identification number is a digit number?