Showing posts with label COMPUTER AND MARKETING AWARENESS. Show all posts
Showing posts with label COMPUTER AND MARKETING AWARENESS. Show all posts

Monday, December 26, 2016


Friday, February 15, 2013

The Internet

It is a system with billions of users worldwide. It permits communication and sharing of all types of information between any two or more computers connected through a large and complex network. It was started in 1960’s and opened for public use in 1990’s. With the passage of time it has witnessed tremendous growth and it is still expanding its reach. Its applications include

(i) E mail – It permits exchange of text/graphic material using email software. We can write a letter and send it to the recipient through ISP’s (Internet Service Providers) who work like the dispatching and receiving post offices.

(ii) File transfer – A FTP (File Transfer Programmes) allows transfer of files/software from one computer to another connected to the Internet.

(iii) World Wide Web (WWW) – Computers that store specific information for sharing with others provide websites either directly or through web service providers. Government departments, companies, NGO’s (Non-Government Organisations) and individuals can post information about their activities for restricted or free use on their websites. This information becomes accessible to the users. Several search engines like Google, Yahoo! etc. help us in finding information by listing the related websites. Hypertext is a powerful feature of the web that automatically links relevant information from one page on the web to another using HTML (hypertext markup language).

(iv) E-commerce – Use of the Internet to promote business using electronic means such as using credit cards is called E-commerce. Customers view images and receive all the information about various products or services of companies through their websites. They can do on-line shopping from home/office. Goods are dispatched or services are provided by the company through mail/courier.

(v) Chat – Real time conversation among people with common interests through typed
messages is called chat. Everyone belonging to the chat group gets the message
instantaneously and can respond rapidly.

Facsimile (FAX)
It scans the contents of a document (as an image, not text) to create electronic signals. These signals are then sent to the destination (another FAX machine) in an orderly manner using telephone lines. At the destination, the signals are reconverted into a replica of the original document. Note that FAX provides image of a static document unlike the image provided by television of objects that might be dynamic.

Mobile telephony
The concept of mobile telephony was developed first in 1970’s and it was fully implemented in the following decade. The central concept of this system is to divide the service area into a suitable number of cells centred on an office called MTSO (Mobile Telephone Switching Office). Each cell contains a low-power transmitter called a base station and caters to a large number of mobile receivers (popularly called cell phones). Each cell could have a service area of a few square kilometers or even less depending upon the number of customers. When a mobile receiver crosses the coverage area of one base station, it is necessary for the mobile user to be transferred to another base station. This procedure is called handover or handoff. This process is carried out very rapidly, to the extent that the consumer does not even notice it. Mobile telephones operate typically in the UHF range of frequencies (about 800-950 MHz).


(i) Transducer: Any device that converts one form of energy into another can be termed as a transducer. In electronic communication systems, we usually come across devices that have either their inputs or outputs in the electrical form. An electrical transducer may be defined as a device that converts some physical variable (pressure, displacement, force, temperature, etc) into corresponding variations in the electrical signal at its output.

(ii) Signal: Information converted in electrical form and suitable for transmission is called a signal. Signals can be either analog or digital. Analog signals are continuous variations of voltage or current. They are essentially single-valued functions of time. Sine wave is a fundamental analog signal. All other analog signals can be fully understood in terms of their sine wave components. Sound and picture signals in TV are analog in nature. Digital signals are those which can take only discrete stepwise values. Binary system that is extensively used in digital electronics employs just two levels of a signal. ‘0’ corresponds to a low level and ‘1’ corresponds to a high level of voltage/ current. There are several coding schemes useful for digital communication. They employ suitable combinations of number systems such as the binary coded decimal (BCD). American Standard Code for Information Interchange (ASCII) is a universally popular digital code to represent numbers, letters and certain characters.

(iii) Noise: Noise refers to the unwanted signals that tend to disturb the transmission and processing of message signals in a communication system. The source generating the noise may be located inside or outside the system.

(iv) Transmitter: A transmitter processes the incoming message signal so as to make it suitable for transmission through a channel and subsequent reception.

(v) Receiver: A receiver extracts the desired message signals from the received signals at the channel output.

(vi) Attenuation: The loss of strength of a signal while propagating through a medium is known as attenuation.

(vii) Amplification: It is the process of increasing the amplitude (andconsequently the strength) of a signal using an electronic circuit called the amplifier. Amplification is necessary to compensate for the attenuation of the signal in communication systems. The energy needed for additional signal strength is obtained from a DC power source. Amplification is done at a place between the source and the destination wherever signal strength becomes weaker than the required strength.

(viii) Range: It is the largest distance between a source and a destination up to which the signal is received with sufficient strength.

(ix) Bandwidth: Bandwidth refers to the frequency range over which an equipment operates or the portion of the spectrum occupied by the signal.

(x) Modulation: The original low frequency message/information signal cannot be transmitted to long distances. Therefore, at the transmitter, information contained in the low frequency message signal is superimposed on a high frequency wave, which acts as a carrier of the information. This process is known as modulation. As will be explained later, there are several types of modulation, abbreviated as AM, FM and PM.

(xi) Demodulation: The process of retrieval of information from the carrier wave at the receiver is termed demodulation. This is the reverse process of modulation.

(xii) Repeater: A repeater is a combination of a receiver and a transmitter. A repeater, picks up the signal from the transmitter, amplifies and retransmits it to the receiver sometimes with a change in carrier frequency. Repeaters are used to extend the range of a communication system as shown in Fig. 15.2. A communication satellite is essentially a repeater station in space.

Tuesday, January 29, 2013


Application: Application is another term for software program; basically a program you use on a computer, like Word, TurboTax, Outlook, etc.

Bandwidth: A measurement of a data line's transmission speed, or the amount of data a network can transfer from one computer to another in a given amount of time.

BIOS: Basic Input/Output System. This term is used to refer to ROM BIOS chip inside the computer. This chip starts and manages the computer bootup process.

Bootstrap Loader: A small program that manages a computer boot up process until the operating system can take over. The bootstrap loader’s only job is to load other software, usually in a sort of sequential chain up to the point when the operating system can get loaded into memory and start. The name "bootstrap loader" comes from the idea that the computer is pulling itself up by its "bootstraps".

Broadband: A bandwidth term that means a data line that will allow large amounts of data to be transferred very quickly. Basically a broadband line will be much, much faster than an old dial-up line.

Burn: To “burn” a CD or DVD means to write data files to it using a special piece of hardware.

Bus: A collection of (usually copper) wires through which data is transmitted from one part of a computer to another. You can think of a bus as a "highway" on which data travels within a computer.

Cable vs DSL: Cable and DSL are types of broadband data lines. Cable internet access uses the same lines that bring cable television cable to your house, and DSL (Which stands for Digital Subscriber Line) is a type of high speed data compression which runs over plain old telephone service (POTS) lines.

CMOS: A type of computer chip which is able to operate with a very small amount of electricity from a battery. The term also refers to the contents of a CMOS chip within the computer, which holds information about the computer boot devices, the date and time and its peripherals even while the system is turned off.

Computer Resource: This is a general computer terminology for the components that comprise the processing flow of a computer, including the memory, CPU, etc. You might hear someone say "this program is a resource hog", meaning it takes up a lot of the computer processing ability, and might make the computer run slower overall.

CPU: This stands for Central Processing Unit, and it can mean the box that holds the guts of the computer, or the processor “brain” of the computer. The CPU is the place where all the computer calculations happen.

CPU Sink: CPUs heat up as they work. A CPU sink is a mechanism to keep the CPU cool while it does its calculations. It usually consists of a cooling fan and an aluminum heat sink which draws the heat away the CPU chip.

Defrag: Computers write information to a hard drive by filling in open places on the drive. They don’t write files all in one big block, which means your Word document might be spread out all over your hard drive.
To defrag your computer means to basically rearrange the files on your computer’s hard drive so that file parts are closer together. Once rearranged, the computer will take less time to access the files. Defragging is usually recommended to speed up a slow computer.

Hard Drive: This is the central storage space for your computer. Almost always, the hard drive is designated as C: drive. If the drive is partitioned (i.e., split up into different sections), there might also be a D: drive.

IP address: IP (Internet Protocol) addresses are assigned to each and every computer on a TCP/IP network. They work like your home address. Mail or any other package could not get to you if you
had no address. IP addresses basically insure that data on a network goes where it is supposed to go. IP addresses look something like this:

ISP: Internet Service Provider: This would be the company that provides your internet access.

Malware: a general term for any malicious piece of software, such as a virus, worm, or trojan.

Mother Board: The green board inside of a computer that allows all of the internal computer components to interact. Some would call it the "heart" of the computer. It routes data to and from all the other parts, including the CPU chip, the RAM, the power supply, etc.

Network Interface Card (NIC): This is a part of the computer that allows it to talk to other computers (aka, a network) via a network “protocol” or language like TCP/IP.

Operating system: This is the basic software that a computer runs on. Windows 98, Windows XP, Windows Vista, Linux, Unix, and Apple’s Mac OS X Leopard are all operating systems.

Peripherals: This is a general term for computer add-ons like printers, mice, keyboards, scanners, monitor, etc..

POST: This stands for Power On Self Test. When you first turn on a computer, it checks to make sure all its parts are working; it makes sure a keyboard is attached, that memory loads, and that in general, its hardware is working and ready to load the operating system. This test is called the POST.

Processor chip (or just processor): This is the brain of the computer. You’ve probably heard the commercials for the "Intel" chip or the "Xeon" chip. They are talking about the "brain" of the computer, which does all the calculations and task processing.

RAM: this stands for Random Access Memory and is used generically as “memory”. This is the memory on a computer that allows you to hold and run a program so that you work with it on the monitor. More RAM is better. At the risk of repeating myself, RAM is dependent on electricity, meaning it is cleared or reset when the computer's power is turned off.
So when your computer loses power or freezes up while you are writing an unsaved document, the document is lost. Train yourself to remember to press Control + S to save your documents when you are working on them. Saving them writes them to the hard drive where they will stay when the computer is turned off.

ROM: Read Only Memory. Usually seen in conjunction with BIOS, as in ROM BIOS. Usually a chip onto which the information is permanently burned. Also denotes memory that can be accessed and read, but not written to.

Routine: A series of instructions written to complete a specific but
limited computing task.

TCP/IP: Transmission Control Protocol and Internet Protocol. These are the basic data transmission protocols on which the internet and most commercial networks run.

Uninterruptible Power Source (UPS): A constantly charging battery which will act as a fail safe if the electricity shuts down while you are using your computer. In the event of a total power failure, a UPS usually has just enough charge to power your computer for the time it takes you to save your
work and shut down safely.

URL: Universal Resource Locater. The address of any website on the internet. For instance, my website home page has a URL of

Worm: A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers, usually via network connection. It does not attach itself to other programs, but it might alter, install, or destroy files and programs. It's also used in computer terminology as a short word any malware in general.


Application Files
Program files environment where you can create and edit the kind of document that application makes.

To select an object by pressing the mouse button when the cursor is pointing to the required menu option, icon or hypertext link.

To close a window that has been opened for viewing and / or editing.

A general-purpose machine that processes data according to a set of instructions that are stored internally either temporarily or permanently.

Central Processor Unit (CPU)
This term has two meanings (just to confound beginners, you understand)
1) Central Processor Unit--the main chip on the computer that makes everything go.
2) The box that holds the guts of the computer. A faster CPU is always better than a slower one. You can never have too fast of a CPU.

Your computer or application no longer works correctly and so you "loose" all the work you've done since the last time you saved.

Creating A File
Storing data as a file with an assigned file name that is unique
within the directory it resides in.

To remove an item of data from a file or to remove a file from the disk.

An on-screen representation of a desktop such as used in the Macintosh and Windows operating systems.

Dialog Boxes
Takes over your screen and allows you to "dialog" with the computer.

Directory (AKA Folder, sub-directory)
Allows you to organize files and other folders.

Disk Space
This is the place where your files live. The greater the disk space the more files you can keep. (See also Megabytes) More disk space is always better than less. You can never have much disk space.

Files you create and edit.

Document Files
Files we care about (memos, letters, pictures, etc.)

Double Click
To press the mouse button twice in rapid succession without moving the mouse between clicks.

To move an object on screen in which its complete movement is visible from starting location to destination.

To make a change to existing data.

File Cabinet
Metaphorically, the hard drive (and other kinds of storage media like floppy disks) which store files and folders.

Folder (AKA Directory, Sub-Directory)
Allows you to organize files and other folders.

Folder Icons
Collections of documents and other folders.

In a graphical user interface (GUI), a small, pictorial, on screen representation of an object, such as a document, program, folder or disk drive.

Icon View
Allows you to see icons of folders and files primarily as icons with little information.

This if the primary text input device. It also contains certain standard function keys, such as the Escape key, tab, and arrow keys, shift and control keys, and sometimes other manufacturer-customized keys.

Kilo (K)
This is a unit of measure = 1,000. So 1,000 bytes is a KiloByte.

List View
Shows the icons but also orders the icons (often by name, but can sort the list in other ways) and shows more information about them.

The brand name of a family of personal computers (hardware) and an operating system (software) from Apple, introduced in 1984.

Megabytes (Mb)
Mega = million so Mb is 1,000,000 bytes. It's enough information for the computer to store one character (e.g. "h"), so 1mb text file = 1,000,000 keystrokes in that file. Just to confound the masses, although RAM and Disk Space do something completely different we measure both in megabytes. This leads to confusion.

MegaHertz (Mhz)
This stands for MegaHertz. A hertz is an electronics term. 1 hz = one cycle (or wavelength) per second. 1 megahertz = 1,000,000 cycles per second.
In computer jargon, Mhz measures how *fast* your CPU chip runs. Although it's more important to know the chip than the speed, if you're comparing the same kind of CPU chip then a higher / faster CPU speed (measured in MHz) is better than a slower speed.

Displays a list of commands, some with images next to them.

Modifier Keys
Keys that change the meaning of what you type.

Pointing device that allows you to tell the computer what to do.

Operating System (OS)
System software that allows your computer to work.

Pointer (AKA Cursor)
The name of the arrow (or other shape) that tracks across the screen as you move the mouse (or other pointing device) around.

Random Access Memory (RAM)
This stands for Random Access Memory. You can think of this as the "space" where you computer does its processing. The more space you have the more processes you can run at the same time. More RAM is always better than less. You can never have much RAM.

Recycle Bin
Place where you put files and folders that you may later want to delete or get rid of. Compare Trash.

Resize Box
Allows you to change the size and shape of a window.

Right click
To press the right button on the mouse. (This is Windows specific. On a Mac running System 8 or higher, you hold down the Control key and then click to get the same effect.)

Tell the computer to create a file on disk that has the information you've put into the document (usually typing).

Save As
Give the file a name and/or store the file in a certain place.

Scroll bar
Allows you to move around through your document.

Shut down
To quit all applications and turn off the computer.

Instructions that tell the computer what to do.

System files
Allows our computer to work.

Place where you put files and folders that you want to delete or get rid of.

Volume Icons
Devices that hold files and folders.

1) The most widely used operating system for personal computers from Microsoft. (Software only. Other companies manufacture the hardware that runs the Windows Operating System.) Compare Macintosh. (Windows with a large "W".)
2) The thing you see on screen that contains a directory listing or the contents of a document. (Window with a small "w".)

Saturday, January 26, 2013

Current Position of Technological Banking Services Drift Towards Innovative Banking

1. Presence of Women on Boards
Banking in the West has traditionally been a male bastion and continues to be so. Study titled “Women on Corporate Boards in India 2010” ranked the companies listed in the Bombay Stock Exchange (BSE-100) in terms of the gender diversity of their boards, with those with the highest percentage of women on their boards appearing at the top. The BSE-100 comprises 26 industry classifications with the banking industry making up the largest group of companies.
Indian banks, with better gender equality on board than their western counterparts, scraped though the economic slowdown unscathed. Kalpana Morparia heads the Indian arm of global financial leviathan J. P. Morgan Chase & Co; Meera Sanyal is the country executive for Royal Bank of Scotland and; Manisha Girotra is the managing director of Union Bank of Switzerland’s India operations. K. J. Udeshi is the Chairman of Governing Council of BCSBI.
 2. Mobile Branches
Domestic scheduled commercial banks (other than RRBs) were granted general permission by RBI, to operationalise Mobile branches in Tier 3 to Tier 6 centres (with population upto 49,999 as per Census 2001) and in rural, semi urban and urban centres in the North Eastern States and Sikkim, subject to reporting. The mobile branch should be stationed in each village/location for a reasonable time on specified days and specified hours, so that its services could be utilized properly by customers. The business transacted at the mobile branch shall be recorded in the books of the base branch/data centre. The bank may give wide publicity about the mobile branch in the village, including details of ‘specified days and working hours’ at various locations so as to avoid any confusion to local customers; and any change in
this regard should also be publicized.
3. Social Responsibility, Sustainable Development and Non-Financial Reporting
Government infused into bank-ing sector the ‘socialist’ constituent through nationalization of major banks.
CSR entails the integration of social and environmental concerns by companies in their business operations as also in interactions with their stakeholders. SD essentially refers to the process of maintenance of the quality of environmental and social systems in the pursuit of economic development. NFR is basically a system of reporting by organizations on their activities in this context, especially as regards the triple bottom line, that is, the environmental, social and economic accounting. RBI circular (dated December 20, 2007) on Role of Banks in Corporate Social Responsibility, Sustain-able Development and Non-Financial Reporting is appreciable. Stressing the need for Corporate Social Responsibility (CSR), RBI pointed out that these
initiatives by the banks are vital for sustainable development. Banks have been directed to start; non-financial reporting will help to audit their initiatives towards the corporate social responsibility (CSR). Such a reporting will cover the work done by the banks towards the social, economic and environmental betterment of
4. Universal Banking
Universal Banking refers to those services offered by banks beyond traditional banking service such as saving accounts and loans and includes Pension Funds Management, undertaking equipment leasing, hire purchase business and factoring services, Primary Dealer-ship (PD) business, insurance business
and mutual fund business.
The issue of universal banking came to limelight in 2000, when ICICI gave a presentation to RBI to discuss the time frame and possible options for transforming itself into an universal bank. Later on RBI asked financial institutions which are interested to convert them into a universal bank, to submit their plans for
transition to a universal bank for consideration and furtherdiscussions. FIs need to for-mulate a road map for  the transition path and strategy for smooth con-version into an universal bank over a specified time frame. The plan should specifically provide for full com-pliance with prudential norms as applicable to banks
over the proposed period. Though the DFIs would continue to have a special role in the Indian financial System, until the debt market demonstrates substantial improvements in terms of liquidity and depth, any DFI, which wishes to do so, should have the option to transform into bank (which it can exercise), provided the prudential norms as applicable to banks are fully satisfied. To this end, a DFI would need to prepare a transition path in order to fully comply with the regula-tory requirement of a bank. The DFI concerned may consult RBI for such transition arrangements. Reserve Bank will consider such requests on a case by case basis. Thus, Indian financial structure is slowly evolving towards a continuum of institutions rather than discrete specialization.
The applicability of various existing laws and banking practices to e-banking is not tested and is still evolving, both in India and abroad. With rapid changes in technology and innovation in the field of e-banking, there is a need for constant review of different laws relating to banking and commerce. A re-orientation of strategy is required in order to accommodate the changes and challenges of the present globalised scenario. Technological developments may become threat but still enable banks to access the global market through the electronic networks. IT usage by banks would continue to exist in substantial scales. Indian Banking is trying to embrace latest technology upgrading its services. Clientele are reveling sophisticated services specific needs, preferences and conveniences by the banks.


Core Banking Systems —The introduction of Core Banking Systems (CBS) which was at its nascent stages has become full blown and all banks are at varying stages of implementation of Core Banking Systems in their branches. There are 5 ingredients that form part of the Core Banking system viz. General Ledger
Customer, Information System, Deposit System, Loan System and Management Information System.

INFINET—INFINET (Indian Financial Network), is used by a large number of banks for funds and non-funds-based message transfers, and is made available by the Institute for Development and Research in Banking Technology (IDRBT), Hyderabad. INFINET is perhaps among the few networks in the world which uses the latest in technology and security called Public Key Infrastructure—PKI, which is not only state-of-the-art and robust but also well within the legal requirements of the Information Technology Act, 2000.

National Electronic Funds Transfer System— RBI introduced an electronic funds transfer system to facilitate an efficient, secure, econo-mical, reliable and expeditious system of funds transfer and clearing in the banking sector throughout India, and to relieve the stress on the existing paper-based funds transfer and clearing system called National Electronic Funds Transfer System (NEFT System).
The parties to a funds transfer under this NEFT System are the sending bank, the sending Service Centre, the NEFT Clearing Centre, the receiving Service Centre and the beneficiary branch. The EFT scheme enables transfer of funds within and across cities and between branches of a bank and across banks.

National Electronic Clearing Services —The objective of National Electronic Clearing Services (NECS) is to facilitate centralised processing for repetitive and bulk payment instructions. Sponsor banks shall submit NECS data at a single centre viz. at Mumbai. While NECS (Credit) shall facilitate multiple credits to beneficiary accounts at destination branch against a single debit of the account of a User with the sponsor bank, the NECS (Debit) shall facilitate multiple debits to destination account holders against single credit to user account.

Centralized Funds Management System —The Centralized Funds Management System (CFMS), is a system to enable operations on current accounts maintained at various offices of the Bank, through standard message formats in a secure manner. It is set up, operated and maintained by the Reserve Bank of India.

Mobile Banking Services —Mobile payments is defined as information exchange between a bank and its customers for financial transactions through the use of mobile phones. Mobile payment involves debit/credit to a customer’s account’s on the basis of funds transfer instruction received over the mobile phones.
Only Indian Rupee-based domestic services shall be provided. Use of mobile banking services for cross border inward and outward transfers is strictly prohibited. Only banks which have implemented core banking solutions would be permitted to provide mobile banking services. Banks shall file Suspicious Transaction Report (STR) to Financial Intelligence Unit–India (FIU-IND) for mobile banking transactions as in the case of normal banking transactions. To ensure inter-operability between banks, and between their mobile banking service providers, banks shall adopt the message formats like ISO 8583, with suitable modification
to address specific needs. Hence, banks offering mobile banking should notify the customers the timeframe and the circumstances in which any stop-payment instructions could be accepted.

Marketing Aptitude/Computer Knowledge SET 4

1. A keyboard is this kind of device—
(A) black
(B) input
(C) output
(D) word Processing
(E) None of these
Ans : (B)

2. IT stands for—
(A) information Technology
(B) integrated Technology
(C) intelligent Technology
(D) interesting Technology
(E) None of these
Ans : (A)

3. Which of the following refers to the fastest, biggest and most expensive computers ?
(A) Personal Computers
(B) Supercomputers
(C) Laptops
(D) Notebooks
(E) None of these
Ans : (B)

4. A collection of related information sorted and dealt with as a unit is a—
(A) disk
(B) data
(C) file
(D) floppy
(E) None of these
Ans : (C)

5. The process of a computer receiving information from a server on the Internet is known as—
(A) pulling
(B) pushing
(C) downloading
(D) transferring
(E) None of these
Ans : (C)

6. Which part of the computer helps to store information ?
(A) Disk drive
(B) Keyboard
(C) Monitor
(D) Printer
(E) None of these
Ans : (A)

7. ………………is the process of carrying out commands.
(A) Fetching
(B) Storing
(C) Executing
(D) Decoding
(E) None of these
Ans : (C)

8. The role of a………generally is to determine a buyer’s needs and match it to the correct hardware and software.
(A) computer Scientist
(B) computer sales representative
(C) computer consultant
(D) corporate trainer
(E) None of these
Ans : (B)

9. Which of the following groups consist of only output devices ?
(A) Scanner, Printer, Monitor
(B) Keyboard, Printer, Monitor
(C) Mouse, Printer, Monitor
(D) Plotter, Printer, Monitor
(E) None of these
Ans : (D)

10. The rectangular area of the screen that displays a program, data, and/or information is a—
(A) title bar
(B) button
(C) dialog box
(D) window
(E) None of these
Ans : (D)

11. A ………contains commands that can be selected.
(A) pointer
(B) menu
(C) icon
(D) button
(E) None of these
Ans : (B)

12. An error is also known as—
(A) bug
(B) debug
(C) cursor
(D) icon
(E) None of these
Ans : (A)

13. Arithmetic Operations—
(A) involve matching one data item to another to determine if the first item is greater than, equal to, or less than the other item
(B) sort data items according to standard, predefined criteria in ascending order or descending order
(C) use conditions with operators such as AND, OR and NOT
(D) include addition, subtraction, multiplication and division
(E) None of these
Ans : (D)

14. Sending an e-mail is similar to—
(A) picturing an event
(B) narrating a story
(C) writing a letter
(D) creating a drawing
(E) None of these
Ans : (C)

15. Promotion in Marketing means—
(A) passing an examination
(B) elevation from one grade to another
(C) selling the products through various means
(D) selling the product in specific areas
(E) None of these
Ans : (C)

16. Microsoft Word is an example of—
(A) an operating system
(B) a processing device
(C) application software
(D) an input device
(E) None of these
Ans : (B)

17. Sources of Sales Leads are—
(A) Data Mining
(B) Market Research
(C) Media Outlets
(D) Promotional Programs
(E) All of these
Ans : (E)

18. Any data or instruction entered into the memory of a computer is considered as—
(A) storage
(B) output
(C) input
(D) information
(E) None of these
Ans : (A)

19. Which part of the computer displays the work done ?
(B) printer
(C) monitor
(E) None of these
Ans : (C)

20. One of the methods for Market Monitoring is—
(A) to watch TV serials
(B) to discuss with other sales persons
(C) to monitor media outlets
(D) All of these
(E) None of these
Ans : (C)

21. Market Expansion means—
(A) hiring more staff
(B) firing more staff
(C) buying more products
(D) buying more companies
(E) None of these
Ans : (E)

22. A series of instructions that tells a computer what to do and how to do it is called a—
(A) program
(B) command
(C) user response
(D) processor
(E) None of these
Ans : (A)

23. Effective marketing helps in—
(A) developing new products
(B) creating a competitive environment
(C) building demand for products
(D) All of these
(E) None of these
Ans : (D)

24. Which is the part of a computer that one can touch and feel ?
(A) Hardware
(B) Software
(C) Programs
(D) Output
(E) None of these
Ans : (A)

25. A Call in Marketing means—
(A) to phone the customers
(B) to visit the customers
(C) to visit the marketing site
(D) to call on prospective customers
(E) None of these
Ans : (D)

26. Delivery Channel means—
(A) maternity wards
(B) handing over the products to the buyers
(C) places where products are made available to the buyers
(D) All of these
(E) None of these
Ans : (C)

27. Processing involves—
(A) inputting data into a computer system
(B) transforming input into output
(C) displaying output in a useful manner
(D) providing relevant answers
(E) None of these
Ans : (B)

28. One of the following is a target group for the marketing of Internet Banking.
(A) All the customers
(B) All the educated customers
(C) All the computer educated customers
(D) Only creditors
(E) All of these
Ans : (C)

29. Innovation mean—
(A) Product Designing
(B) New ideas
(C) Impulse
(D) Both (A) and (B)
(E) None of these
Ans : (D)

30. One of the following is a target group for the marketing of educational loan.
(A) All the customers
(B) Students
(C) Only poor students
(D) Students having promising educational track record
(E) All of these
Ans : (B)

31. Service after sale is not the function of—
(A) Marketing staff
(B) Seller
(C) Director of the company
(D) Employees of the company
(E) All of the above are wrong
Ans : (A)

32. If done through………the rural marketing would be more effective.
(A) fairs
(B) village fairs
(C) door to door campaign
(D) All of these
(E) None of these
Ans : (B)

33. Market Survey means—
(A) Market Research
(B) Market Planning
(C) Marketing Strategies
(D) Market Monitering
(E) All of these
Ans : (A)

34. ………can be done through digital Banking ?
(A) Mobile phone
(B) Internet
(C) Telephone
(D) All of these
(E) None of these
Ans : (A)

35. A good seller should have the following quality/qualities ?
(A) Devotion to the work
(B) Submissive
(C) Sympathy
(D) All of these
(E) None of these
Ans : (D)

36. The rural marketing is not required because—
(A) rural people do not understand marketing
(B) its not practical from the cost point of view
(C) it is sheer wastage of time
(D) All are wrong
(E) All are correct
Ans : (D)

37. Planned-cost service means—
(A) Costly products
(B) Extra profit on the same cost
(C) Extra work by seller
(D) All of these
(E) None of these
Ans : (B)

38. Internet marketing means—
(A) Self-marketing
(B) Core Groups monitering
(C) Employees marketing
(D) All of these
(E) None of these
Ans : (E)

39. The aim of successful marketing is—
(A) to increase the sale
(B) to increase the profit
(C) to increase the output of sellers
(D) All of these
(E) None of these
Ans : (D)

40. The networking becomes……through networking.
(A) very difficult
(B) dull
(C) easy
(D) has no role in marketing
(E) None of these
Ans : (C)

Questions on Banking and Marketing SET 3

1. A prospect means
a) any customer who walks into the bank
b) an employee of the bank
c) a customer who is likely to be interested in bank’s product or service
d) a depositor of the bank’
e) a borrower of the bank

2. A lead means
a) a prospect who is more likely to avail of the Bank’s product
b) a political leader
c) a religious leader
d) a bank chairman
e) None of these

3. Innovation means
a) Compensation
b) inspiration
c) additional perquisites
d) implementing new ideas or new methods
e) None of these

4. A Call means
a) calling on friends
b) calling on bank employees
c) calling on prospective customers
d) to make telephone calls
e) calling on relatives

5. The Traditional Marketing style involves
a) Telemarketing
b) Digital Marketing
c) Indirect Marketing
d) Direct Marketing
e) All of these

6. Modern Method of Marketing include
a) Publicity on the net
b) Advertisement on the net
c) Soliciting business through e-mails
d) Tele marketing
e) All of these

7. A true marketing requires
a) Command and other mindset
b) Control Mindset
c) Passive mindset
d) Active mindset
e) None of these

8. Which of the following sentences is true?
a) Marketing is not required in a Buyers’ Market
b) Marketing is not required in a Sellers’s market
c) Marketing is not required due to competition
d) Marketing is not required due to liberalization
e) Marketing is not required due to globalisation

9. For effective marketing the salesmen should have which of these qualities?
a) Creativity
b) Team spirit
c) Motivation
d) Effective communication skills
e) All of these

10. Market information means
a) Knowledge of shops and bazaars
b) Knowledge of shopping malls
c) Knowledge of customer profile and product mix
d) knowledge of various languages
e) None of these

11. Market Research is needed for
a) checking the market area
b) checking the right product to be sold
c) making proper marketing decisions
d) deciding right time to sell
e) All of these

12. Which of the following statement is true
a) Marketing makes the company to go into loss due to higher expenses
b) Marketing is not required in profit making companies
c) Marketing sharpens the minds of the employees
d) Marketing is a time bound seasonal function
e) Marketing is a waste of time

13. Marketing plan helps in
a) better lead generation
b) better systems
c) better results
d) improved balance sheet
e) better customer service

14. If Marketing is done effectively which of the following is not required?
a) Advertisement
b) Publicity
c) Market Research
d) Market Segmentation
e) None of these

15. Motivation means
a) Inspiring employees to perform better
b) Better communication skills
c) Sales Coaching
d) Market Research
e) None of these

16. In a Selling Process in today’s world?
a) Only standard products are sold
b) No customization required
c) the seller need not have product knowledge
d) the seller should aim at customer satisfaction
e) only quantum of sales matters

17. Find the true statement
a) Marketing is a waste of the employees’ time
b) Marketing is not required in India due to its vast population
c) Marketing involves additional work
d) Marketing involves team work
e) Marketing is not required today due to IT advancement

18. A Target market is
a) entire country
b) entire city
c) entire globe
d) that which consists of customers who need the identified product
e) all of these

19. Sales forecasting involves
a) Sales Planning
b) Sales Pricing
c) Distribution Channels
d) Consumer tastes
e) All of these

20. Which of the following product is being sold under the brand name ZODIAC
a) Shirts
b) Ties
c) Both A and B
d) Liberty

21. SWIFT – cars are being manufactured by
a) DCM
b) Maruti
c) Premier Automobiles
d) Hyundai

22. With you all the way is the slogan of
a) Vodafone
b) SBI
d) Raymonds

23. Which company used the slogan “The complete Man”
a) DCM

24. Which brand uses the slogan “Made for each other” for its cigarettes?
a) Cavenders
b) Four Square
c) Red & White
d) Wills

25. Cross Selling means
a) Identifying customer needs
b) matching the products to customer needs
c) convincing the customers of product benefits
d) responding to questions and objections of customers
e) all of these


1 (c) 2 (a) 3 (d) 4 ( c) 5 (d) 6 (e) 7 (d) 8 (b) 9 (e) 10 (c ) 11 (e) 12 (c) 13 ( c) 14 (b) 15 (a)

16 (d) 17 (d) 18 (d) 19 (e) 20 (c) 21 (b) 22 (b) 23 (c) 24 (d) 25 (e)


1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B

16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C

20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A

24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
D. printer
Answer: A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

28. The ____________, also called the “brains” of the computer, is responsible for processing data.
A. motherboard
B. memory
D. central processing unit (CPU)
Answer: D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
D. storage devices
Answer: C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
C. mainframe.
D. platform.
Answer: A 

Computer General Awareness SET 1

1. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these

2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these

3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these

4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these

5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these

6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these

7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these

8. ________ are specially designed computer chips reside inside other devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these

9. The following are all computing devices , except.........
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these

10. in a ring topology , the the computer in possession of the ______ can trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these

11. This part of operating system manages the essential peripherals, such as the keyboard, screen , disk drives, and parallel and serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these

12. ________ Viruses are often transmitted by a floppy disk left in the floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these

13. ________ controls the way in which the computer system functions and provides a means by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these

14. Servers are computers that provide resources to other computers connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these

15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these

16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these

17. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled access to a database
(B) hardware system used to create, maintain, and provide uncontrolled access to a database.
(C) software system used to create, maintain, and provide uncontrolled access to a database.
(D) software system used to create, maintain, and provide controlled access to a database.
(E) None of these

18. Which of the following is NOT a goal of transaction processing system ?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these
ANS ()

19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these

20. When data changes in multiple lists and all lists are not updated, this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these

21. _____________ are words that a programming language has set aside for its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these

22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user's computer to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have the skills to develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
ANS ()

23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these

24. You must install a (n) ____________ on a network if you want to share a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these

25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these

26. Granting an outside organization access to internet web pages is often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these

27. Which term identifies a specific computer on the web and the main page of the entire site
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these

28. The code that relational database management systems use to perform their database task is referred to as .....
(D) Sequel Server
(E) None of these

29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
ANS (c)

30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these

31. A _________ contains specific rules and words that express the logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
ANS ()

32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these

33. The most frequently used instructions of a computer program are likely to be fetched from:
(A) the hard disk
(B) cache memory
(D) registers
(E) None of these

34. The ____________ contains data descriptions and defines the name, data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these

35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these

36. A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
(A) command - based user interface
(C) system utility
(E) None of these

37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming
(C) technical
(D) user
(E) None of these
ANS ()

38. Which of the following is NOT a type of broadband Internet connection?
(A) Cable
(C) Dial-up
(D) Satellite
(E) None of these

39. Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these

40. Making a field ______ means that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these

41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
ANS ()

42. ____________ are viruses that are triggered by the passage of time or on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans (C)

43. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these

44. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system crash or failure
(D) All of these
(E) None of these

45. Which of the following places the common data elements in order from smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these

46. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these

47. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these

48. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these

49. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these

50. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these