Thursday, July 14, 2011
Wednesday, July 13, 2011
Sunday, July 10, 2011
INDIAN BANK
Indian Bank probationary officers Exam 2011
GENERAL AWARENESS
Indian Bank Probationary Officers Exam. 2011
General Awareness
(Exam Held on 2-1-2011)
INDIAN BANK RURAL MARKETING OFFICERS EXAM 2010
General English
Indian Bank P.O. Exam., 2010
(Held on 17-1-2010)
General Awareness
Saturday, July 9, 2011
Friday, July 8, 2011
CORPORATION BANK
Corporation Bank Clerk Exam., 2011
English Language
(Exam Held on 12-6-2011)
Corporation Bank Clerks Exam 2011 Solved Paper
GENERAL AWARENESS
(Exam Held On: 12-06-2011)
Corporation Bank PO Solved Question Paper 2010
GENERAL AWARENESS
Wednesday, July 6, 2011
CENTRAL BANK OF INDIA
Central Bank of India Clerk (First Shift) Exam. 2011 Solved Paper
English Language
(Exam Held on 13-2-2011)
Central Bank of India PO Exam Paper 2010
Computer Knowledge
(Exam Held on 25-07-2010)
Central Bank of India P.O. Exam., 2010
English Language
(Exam Held on 25-7-2010)
Central Bank of India P.O. Exam., 2010
General Awareness
(Exam Held on 25-7-2010)
Tuesday, July 5, 2011
Monday, July 4, 2011
Sunday, July 3, 2011
BANK OF INDIA
English Language
(Held on 26-9-2010) (IInd Shift)
General Awareness
Bank of India Probationary Officers Exam 2010
General Awareness
(Held on 31-10-2010)
Bank of India Clerk Exam., 2010 Solved Paper
English Language
(Exam Held on 3-10-2010)
(Second Shift)
Saturday, July 2, 2011
Friday, July 1, 2011
Thursday, June 30, 2011
ALLAHABAD BANK
Allahabad Bank Probationary Officers Exam.
(Held on 17-4-2011)
Allahabad Bank Probationary Officers Exam., 2011 General Awareness
(Exam Held on 17-4-2011)
Wednesday, June 29, 2011
PROFIT AND LOSS
PROFIT AND LOSS
SOME BASIC FORMULA E
1) Gain on Rs. 100 is Gain per cent
2) Loss on Rs. 100 is Loss per cent
Example: The cost price of a shirt is Rs. 200 and selling price is Rs. 250. Calculate the % profit.
Solution : We have, C.P.= Rs. 200,
S.P = Rs. 250.
Profit = S.P. - C.P.
250 - 200 = Rs. 50.
Example: Anu bought a necklace for Rs. 750 and sold it for Rs. 675. Find her percentage loss.
Solution : Here. C.P. = Rs. 750.
S.P. = Rs. 675.
Loss = C.P. - S.P. = 750 - 675 = Rs. 75.
3) When the selling price and gain% are given:
4) When the selling price and loss% are given:
5) When the cost and gain per cent are given:
6) When the cost and loss % are given:
Example: Mr. Sharma buys a cooler for Rs. 4500. for how much should he sell so that there is a gain of 8%?
Solution: We have, C.P. = Rs. 4500, gain% = 8%.
= 4860
Example: By selling a fridge for Rs. 7200, Pankaj loses 10%. find the cost price of the fridge.
Solution: We have. S.P. = Rs. 7200, loss% = 10%.
Tuesday, June 28, 2011
SIMPLE INTEREST
SIMPLE INTEREST
SOME BASIC FORMULA E
1) If P stands for Principal, R the rate per cent per annum. T the number of years, SI the simple interest and A the amount, then
Example: On what sum of money lent out at 9% per annum simple interest for 6 years does the simple interest amount Rs 810?
Solution :
2)
Example: A sum when reckoned at simple interest 2 1/2 % per annum amounts to Rs 630 after 2 years. Find the sum.
Solution :
Monday, June 27, 2011
SOLVED PAPER Allahabad Bank Probationary Officers Exam (17-08-2008)
Computer General Awareness
(Held on 17-08-2008)
1. Programs from the same developer , sold bundled together , that provide better integration and share common features , toolbars and menus are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
Ans : (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
Ans : (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
Ans : (C)
7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
Ans : (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy risks Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
Ans : (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
Ans : (C)
7. System software is the set of programs that enables your computer's hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)
Sunday, June 26, 2011
Allahabad Bank Probationary Officers Exam, (21-2-2010)
Computer Knowledge
(Held on 21-2-2010)
1. A………typically connects personal computers within a very limited geographical area, usually within a single building.
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)
6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
(A) LAN
(B) BAN
(C) TAN
(D) NAN
(E) None of these
Ans : (A)
2. Computers manipulate data in many ways, and this manipulation is called—
(A) utilizing
(B) batching
(C) upgrading
(D) processing
(E) None of these
Ans : (D)
3. An e-mail address typically consists of a user ID followed by the ……… sign and the name of the e-mail server that manages the user’s electronic post office box.
(A) @
(B) #
(C) &
(D) *
(E) None of these
Ans : (A)
4. Software applies……, also called algorithms, to process data.
(A) arithmetic
(B) procedures
(C) objects
(D) rules
(E) None of these
Ans : (A)
5. A file extension is separated from the main file name with a(n) ……, but no spaces.
(A) question mark
(B) exclamation mark
(C) underscore
(D) period
(E) None of these
Ans : (E)
6. An ad hoc query is a—
(A) pre-planned question
(B) pre-scheduled question
(C) spur-of-the-moment question
(D) question that will not return any results
(E) None of these
Ans : (B)
7. A Web ……… consists of one or more Web pages located on a Web server.
(A) hub
(B) site
(C) story
(D) template
(E) None of these
Ans : (B)
Saturday, June 25, 2011
SOLVED PAPER Central Bank of India P.O. Exam.,( 25-7-2010)
COMPUTER KNOWLEDGE
(ExamHeld on 25-7-2010)
1. If a word is typed that is not in Word’s dictionary, a____________wavy underline appears below the word.
(A) red
(B) green
(C) blue
(D) black
(E) None of these
Ans : (A)
2. The____________button on the quick access Toolbar allows you to cancel your recent commands or actions.
(A) Search
(B) Cut
(C) Document
(D) Undo
(E) None of these
Ans : (D)
3. In Excel, any set of characters containing a letter , hyphen, or space is considered—
(A) a formula
(B) text
(C) a name
(D) a title
(E) None of these
Ans : (B)
4. ____________Software allows users to perform calculations on rows and columns of data.
(A) Word processing
(B) Presentation graphics
(C) Database Management Systems
(D) Electronic Spreadsheet
P a g e | 61
(E) None of these
Ans : (C)
5. A ____________represent approximately one billion memory locations.
(A) kilobyte
(B) megabyte
(C) gigabyte
(D) terabyte
(E) None of these
Ans : (C)
6. ____________cells involves creating a single cell by combining two or more selected cells.
(A) Formatting
(B) Merging
(C) Embedding
(D) Splitting
(E) None of these
Ans : (B)
7. The operating system is the most common type of____________software.
(A) communication
(B) application
(C) system
(D) word-processing
(E) None of these
Ans : (C)
Friday, June 24, 2011
SOLVED PAPER PUNJAB NATIONAL BANK SPECIAL OFFICERS EXAM (Held on 8-7-2007)
SOLVED PAPER
PUNJAB NATIONAL BANK SPECIAL OFFICERS EXAM., 2007
(Held on 8-7-2007)
Professional Knowledge (Officer IT)
(Based on Memory)
1. Single parity disk relying on the disk controller for finding out which disk has failed is used by—
(A) RAID level 5(B) RAID level 2
(C) RAID level 4
(D) RAID level 3
(E) RAID level 1
2. Which of these terms refers to the feature of an OS that allows a single computer to process the tasks of several users at different stations, in round-robin fashion ?
(A) Multiprocessing(B) Multiprogramming
(C) Multitasking
(D) Time processing
(E) Time-sharing
3. Which of the following statements is not true about two-tier client-server database architecture?
(A) SQL statements are processed on the server(B) SQL statements may be processed on some of the dients
(C) Business logic is mostly processed on clients
(D) Business logic may be processed on the server
(E) None of these
4. A Relational operator that yields all values from selected attributes is known as a—
(A) difference(B) product
(C) select
(D) project
(E) join
5. Normalisation is—
(A) the process of creating small stable data structures from complex groups of data when designing a relational database(B) a methodology for documenting databases illustrating the relationship between various entities in the database
(C) an approach to data management that stores both data and the procedures acting on the data as objects that can be automatically retrieved and shared
(D) a representation of data as they would appear to an application programmer or user
(E) a representation of data as they actually would be organized on physical storage media
6. The process of building a model that demonstrates the features of a proposed product, service or system is called a—
(A) JAD(B) RAD
(C) templating
(D) prototyping
(E) TAD
7. Which of the following is not a mandatory component of a URL?
(A) Resource Path(B) Protocol
(C) Port Number
(D) Domain Name
(E) None of these
Thursday, June 23, 2011
Solved Paper INDIAN BANK COMPUTER OFFICERS EXAM., 2008 (Held on 30-3-2008)
INDIAN BANK COMPUTER OFFICERS (IT) EXAM., 2008
(Held on 30-3-2008)
Professional Knowledge
(Based on Memory)
1. A passive threat to computer security is—
(A) Malicious Intent
(B) Sabotage
(C) Accidental Errors
(D) Espionage Agents
(E) None of these
2. The Secure Electronic Transaction (SET) specification—
(A) Is a notice, issued and verified by a certificate authority, that guarantees a user or Web site is legitimate
(B) Provides private-key encryption of all data that passes between a client and a server
(C) Allows users to choose an encryption scheme for the data that passes between a client and a server
(D) Uses a public-key encryption to secure credit-card transaction systems
(E) None of these
3.____allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.
(A) TCP/IP
(B) Ethernet
(C) WAP
(D) Token ring
(E) None of these
4. 'DOS' floppy disk does not have—
(A) A Boot Record
(B) A File Allocation Table
(C) A Root Directory
(D) Virtual Memory
(E) BIOS
5. 'MICR' technology used for clearance of cheques by banks refers to—
(A) Magnetic Ink Character Recognition
(B) Magnetic Intelligence Character Recognition
(C) Magnetic Information Cable Recognition
(D) Magnetic Insurance Cases Recognition
(E) None of these
6. All the information collected during database development is stored in a—
(A) Repository
(B) Data warehouse
(C) RAD
(D) CASE
(E) None of these
7. The component is used by the data analyst to create the queries that access the database.
(A) Data extraction
(B) End-user query tool
(C) End-user presentation tool
(D) Data store
(E) None of these
Wednesday, June 22, 2011
Union Bank of India Probationary Officers Exam.(9-1-2011) Solved Paper
Computer Knowledge
(Exam Held on 9-1-2011)
(A) My folder
(B) My Documents
(C) My Files
(D) My Text
(E) None of these
Ans : (B)
2. The primary purpose of software is to turn data into—
(A) Web sites
(B) Information
(C) Programs
(D) Objects
(E) None of these
Ans : (B)
3. A directory within a directory is called—
(A) Mini Directory
(B) Junior Directory
(C) Part Directory
(D) Sub Directory
(E) None of these
Ans : (D)
4. A compiler translates a program written in a high-level language into—
(A) Machine language
(B) An algorithm
(C) A debugged program
(D) Java
(E) None of these
Ans : (A)
5. When you turn on the computer, the boot routine will perform this test—
(A) RAM test
(B) Disk drive test
(C) Memory test
(D) Power-on self-test
(E) None of these
Ans : (B)
6. A ……is a unique name that you give to a file of information.
(A) device letter
(B) folder
(C) filename
(D) filename extension
(E) None of these
Ans : (D)
7. Hardware includes—
(A) all devices used to input data into a computer
(B) sets of instructions that a computer runs or executes
(C) the computer and all the devices connected to it that are used to input and output data
(D) all devices involved in processing information including the central processing unit, memory and storage
(E) None of these
Ans : (D)
Tuesday, June 21, 2011
Solved Paper DENA BANK SPECIAL OFFICERS (IT) EXAM., 2007 (Held on 26-8-2007) Information Technology/Systems
1. The___________states that a foreign key
must either match a primary key value in another relation or it must be null.
(A) entity integrity rule
(B) referential integrity constraint
(C) action assertion
(D) composite attribute
(E) None of these
2. An applet________
(A) is an interpreted program that runs on the client
(B) tracks the number of visitors to a Website
(C) is a compiled program that usually runs on the client
(D) collects data from visitors to a Website
(E) None of these
3. A___________, sometimes called a boot
sector virus, executes when a computer boots up because it resides in the boot sector of a floppy disk or the master boot record of a hard disk.
(A) system virus
(B) Trojan horse virus
(C) file virus
(D) macro virus
(E) None of these
4. Which error detection method uses one's complement arithmetic?
(A) Simple parity check
(B) Checksum
(C) Two-dimensional parity check
(D) CRC
(E) None of these
5. A result of a computer virus cannot lead to
(A) Disk Crash
(B) Mother Board Crash
(C) Corruption of program
(D) Deletion of files
(E) None of these
6. The network interface card of LAN is related to following layer of OSI Model—
(A) Transport (B) Network
(C) Data Link (D) Physical (E) All of these
7. Which of the following does not describe a data warehouse ?
(A) Subject-oriented
(B) Integrated
(C) Time-variant
(D) Updateable
(E) None of these
Monday, June 20, 2011
PRIVATE SECTOR BANKS
KARNATAKA BANK LTD.
(under construction)
KARUR VYSYA BANK
(under construction)
Lakshmi Vilas Bank Ltd
(under construction)
Prathama Bank
(under construction)
REPCO BANK
(under construction)
SIDBI
(under construction)
SOUTH INDIAN BANK
(under construction)
Tamilnad Mercantile Bank
(under construction)
THE NAINITAL BANK
(under construction)
Sunday, June 19, 2011
CO-OPERATIVE BANKS
Abhyudaya Co-operative Bank
(under construction)
Kangra Central Cooperative Bank
(under construction)
SARASWAT CO-OP.BANK
(under construction)
Shamrao Vithal Co-operative Bank Ltd (SVC Bank)
(under construction)
Saturday, June 18, 2011
GRAMIN BANKS (RRB)
Allahabad U.P. Gramin Bank
(23-10-2011)
Aryavart Gramin Bank
(20-11-2011)
Aryavarta Gramin Bank
(20-11-2011)
Baroda Rajasthan Gramin Bank
(13-3-2011)
Baroda Rajasthan Gramin Bank
(5-12-2010)
Baroda Rajasthan Gramin Bank
(21-2-2010)
Chhattisgarh Gramin Bank
(22-1-2012)
Chhattisgarh Gramin Bank
(22-1-2012)
Gurgaon Gramin Bank GA
(2010)
Gurgaon Gramin Bank English
(2010)
HADOTI KSHETRIYA GRAMIN BANK
(12-12-2010)
HARYANA GRAMIN BANK
(2008)
Kashi Gomti Samyut Gramin Bank
(12-12-2010)
Maharashtra Gramin Bank
(2009)
Malwa Gramin Bank
(30-1-2010)
Narmada Malwa Gramin Bank
(31-10-2010)
Puduvai Bharathiar Grama Bank
(2010)
Rajasthan Gramin Bank
(2009)
SARVA UP GRAMINA BANK
(23-5-2010)
Satpura Narmada Kshetriya Gramin Bank
Friday, June 17, 2011
19 NATIONALIZED BANKS
ALLAHABAD BANK
ANDHRA BANK
BANK OF BARODA
BANK OF INDIA
BANK OF MAHARASHTRA
CANARA BANK
CENTRAL BANK OF INDIA
CORPORATION BANK
INDIAN OVERSEAS BANK
(under construction)
ORIENTAL BANK OF COMMERCE
(under construction)
PUNJAB AND SIND BANK
(under construction)
PUNJAB NATIONAL BANK
(under construction)
SYNDICATE BANK
(under construction)
UCO BANK
(under construction)
UNION BANK OF INDIA
(under construction)
UNITED BANK OF INDIA
(under construction)
VIJAYA BANK
(under construction)
Subscribe to:
Posts (Atom)