Objects on the slide which holds text?
Which of the following is not available in Font Spacing?
Banks Special
1. Computer audit involves review of ____
a) Established policies
b) Efficiency of operations
c) Checking of data integrity
d) a, b, c e) None of these
2. Which of the following is not available in Font Spacing?
a) Normal b) Loosely
c) Condensed d) Expanded
e) None of these
3. Dynamic Adhoc Wireless Net-works (DAWN) usually come under?
a) 2G b) 3G c) 4G
d) 5G e) None of these
4. Which of the following is Not a characteristic of e-mail?
a) Low cost
b) Record maintenance in data
base
c) High speed d) Waste reduction
e) None of these
5. Which of the following is not an example of hard ware?
a) Scanner b) Printer
c) Mouse d) Monitor
e) Interpreter
6. A magnetic strip is fixed on the back of the cards, which holds information about the customer such as his account number etc also contains his:
a) Personal Identification Number
b) Address c) Age
d) Occupation e) None
7. What is used in most programs that is a part of program and guides the user through certain steps?
a) Wizard b) Software
c) Wiki d) Hardware
e) None of these
8. Which one of the following input device is user-programmable?
a) Dumb terminal
b) Smart terminal c) VDT
d) Intelligent terminal
e) None of these
9. The most frequently used instr-uctions of a computer program are likely to be fetched from?
a) The hard disk
b) Cache memory c) RAM d) Registers e) None
10. In Excel, this is a prerecorded formula that provides a shortcut for complex calculations?
a) Value b) Data Series
c) Function d) Field
e) None of these
11. The secondary storage devices can only store data but they can-not perform?
a) Arithmetic Operation
b) Logic operation
c) Fetch operations
d) All of the above
e) None of the above
12. The One-time password (OTPs) can be obtained by a customer, via which among the following?
a) Approaching the nearest Bank Branch
b) e-mail by applying for OTP online
c) SMS on Mobile
d) All of the above
e) None of these
13. The ____ component is used by the data analyst to create the queries that access the database?
a) Data extraction
b) End User Presentation Tool
c) Data store
d) End User Query Tool
e) None Of These
14. Which of the following is used To access a mainframe or supe-rcomputer?
a) PDA b) Terminal
c) Modem d) Node
e) None of these
15. "Bitmap" is a ?
a) Format which windows use for desktop wall paper
b) Graphic file format made up of small dots
c) Specific kind of bitmap files with the BMP extension
d) All of the above
e) None of these
16. ADSL stands for ?
a) Automatic Digital Subscriber Line
b) Asymmetric Direct Sub-scriber Line
c) Asymmetric Digital Sub-scriber Line
d) Automatic Direct Subscriber Line
e) None of these
17. The most common method of signing digitally is with the help of______cryptography, as con-templated by the Information Te-chnology Act 2000:
a) Public Key b) Biometrics
c) Firewall d) b and c
e) None of these
18. Objects on the slide which holds text are called ______
a) Object holders
b) Text holders c) Auto layout
d) Data holders e) Place holders
19. What is the shortcut key to "Undo" the last action in a docu-ment?
a) Ctrl + U b) Ctrl + Y
c) Ctrl + X d) Ctrl + Z
e) None of these
20. End-to-end connectivity is provi-ded from Host-to-Host in?
a) Network layer b) Session layer
c) Data link layer
d) Transport layer e) None
21. "www" is based on which of the following modes?
a) Local Server b) 2-tier
c) Client server d) 3- tier
e) None of these
22. Which command will be used to duplicate the entire disk?
a) Copy b) Undo
c) Format d) Disk copy
e) None
23. To select the entire column in a worksheet, which of the follow-ing options can be used?
a) Shift + Space
b) Alt + Space c) Shift + Alt
d) Ctrl + Space e) None of these
24. The errors that can be pointed out by the compiler are?
a) Semantic errors
b) Logic errors c) System errors
d) Syntax errors e) None of these
KEY
1) d 2) b 3) d 4) b
5) e 6) a 7) a 8) d
9) b 10) c 11) d 12) c
13) d 14) b 15) d 16) c
17) a 18) e 19) d 20) d
21) c 22) d 23) d 24) d


