1.What is MS Access?
[A] A RDBMS
[B] An OODBMS
[C] An ORDBMS
[D] A Network Database Model
SHOW ANSWER
Explanation: Microsoft Access is a low cost relational database management system (RDBMS) from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools. ©navclasses
2.What is the use of Cascade Delete option in MS Access?
[A] Deletes all records of a table
[B] Deletes all records with duplicate values
[C] Deletes all records automatically when the record is deleted in the parent table
[D] Makes a Duplicate table
SHOW ANSWER
Explanation: Cascade Delete option means that if a record from one table is deleted, corresponding records in the other table are also deleted. ©navclasses
3.Which of these is not an email service provider?
[A] Yahoo
[B] Rediff
[C] WhatsApp
[D] Hotmail
SHOW ANSWER
Explanation: Gmail, Yahoo, Rediff, Hotmail, Outlook are some of the email service providers. WhatsApp is an instant messaging mobile application. ©navclasses
4.What is the email attachment size limit in Gmail?
[A] 10 MB
[B] 20 MB
[C] 25 MB
[D] 40 MB
SHOW ANSWER
Explanation: Users can send up to 25 MB in attachments. If the file is greater than 25 MB, Gmail automatically adds a Google Drive link in the email instead of including it as an attachment. ©navclasses
5.What do we call an attack which overwhelms a system’s resources so that it cannot respond to service requests?
[A] Brute force
[B] Eavesdropping
[C] denial-of-service attack
[D] None of the above
SHOW ANSWER
Explanation: A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A Double denial-of-service (DDoS) attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. ©navclasses
6.What is CodeRed?
[A] An Anti-virus
[B] A Computer worm
[C] A Keylogger
[D] None of the above
SHOW ANSWER
Explanation: Code Red was a computer worm observed on the Internet in 2001 and it launched DOS attack on White House’s website. It attacked computers running Microsoft’s IIS web server. ©navclasses
7.What is the difference between IMPS and NEFT?
[A] IMPS is managed by RBI whereas NEFT is managed by NPCI
[B] IMPS is available 24*7 whereas NEFT is available during NEFT business hours
[C] NEFT is a real time transfer system whereas IMPS is not
[D] None of the above
SHOW ANSWER
Explanation: IMPS is managed by NPCI whereas NEFT is managed by RBI. IMPS is available 24*7 whereas NEFT is available during NEFT business hours. IMPS is a real time transfer system whereas NEFT is not. ©navclasses
8.Which of the following can be used to access the E-banking services?
[A] PC
[B] PDA
[C] ATM
[D] All of the above
SHOW ANSWER
Explanation: The Electronic banking or e-banking services can be accessed via Personal computer, PDA, mobile phones, ATM etc. ©navclasses
9.What do we call those ATMs where hardware is owned by service provider, but cash management and network connectivity is provided by sponsor bank?
[A] White label ATM
[B] Brown label ATM
[C] Black label ATM
[D] None of the above
SHOW ANSWER
Explanation: Brown Label ATM is sharing cost concept. In Brown Label ATM hardware is owned by service provider, but cash management and network connectivity is provided by sponsor bank. ©navclasses
10.What is the full form of ATM?
[A] Automated Teller Machine
[B] Automatic Transaction Machine
[C] Automatic Total Model
[D] None of the above
SHOW ANSWER
Explanation: An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform various financial transactions. ©navclasses
5/10