You are on page 1of 12

IMPORTANT CONCEPTS

Banker's Discount:

Suppose a merchant A buys goods worth, say Rs. 10,000 from another merchant B at a credit of say 5
months. Then, B prepares a bill, called the bill of exchange. A signs this bill and allows B to withdraw the
amount from his bank account after exactly 5 months.

The date exactly after 5 months is called nominally due date. Three days (known as grace days) are
added to it get a date, known as legally due date.

Suppose B wants to have the money before the legally due date. Then he can have the money from the
banker or a broker, who deducts S.I. on the face vale (i.e., Rs. 10,000 in this case) for the period from the
date on which the bill was discounted (i.e., paid by the banker) and the legally due date. This amount is
know as Banker's Discount (B.D.).

Thus, B.D. is the S.I. on the face value for the period from the date on which the bill was discounted and the
legally due date.

Banker's Gain (B.G.) = (B.D.) - (T.D.) for the unexpired time.

Note: When the date of the bill is not given, grace days are not to be added.

IMPORTANT FORMULAE

1. B.D. = S.I. on bill for unexpired time.

(T.D.)2
2. B.G. = (B.D.) - (T.D.) = S.I. on T.D. =
P.W.

3. T.D. P.W. x B.G.

Amount x Rate x Time


4. B.D. =
100
Amount x Rate x Time
5. T.D. =
100 + (Rate x Time)
B.D. x T.D.
6. Amount =
B.D. - T.D.
B.G. x 100
7. T.D. =
Rate x Time
IMPORTANT FACTS

Cost Price:

The price, at which an article is purchased, is called its cost price, abbreviated as C.P.

Selling Price:

The price, at which an article is sold, is called its selling prices, abbreviated as S.P.

Profit or Gain:

If S.P. is greater than C.P., the seller is said to have a profit or gain.

Loss:

If S.P. is less than C.P., the seller is said to have incurred a loss.

IMPORTANT FORMULAE

1. Gain = (S.P.) - (C.P.)

2. Loss = (C.P.) - (S.P.)

3. Loss or gain is always reckoned on C.P.

4. Gain Percentage: (Gain %)

Gain x 100
Gain % =
C.P.

5. Loss Percentage: (Loss %)

Loss x 100
Loss % =
C.P.

6. Selling Price: (S.P.)

(100 + Gain %)
SP = x C.P
100

7. Selling Price: (S.P.)

SP = (100 - Loss %) x C.P.


100
8. Cost Price: (C.P.)

100
C.P. = x S.P.
(100 + Gain %)

9. Cost Price: (C.P.)

100
C.P. = x S.P.
(100 - Loss %)

10. If an article is sold at a gain of say 35%, then S.P. = 135% of C.P.

11. If an article is sold at a loss of say, 35% then S.P. = 65% of C.P.

12. When a person sells two similar items, one at a gain of say x%, and the other at a loss of x%, then
the seller always incurs a loss given by:

Common Loss and Gain % 2 x 2


Loss % = = .
10 10

13. If a trader professes to sell his goods at cost price, but uses false weights, then

Error
Gain % = (True Value) - (Error) x 100
%.

Airtel store

Central : Ghatkopar
Shop no 7 and 8A , Bhaveshwar Plaza Building, Ground Floor, Near Shreyas Cinema, LBS Marg, Ghatkopar (W), Mumbai
400086

1. Principal:

The money borrowed or lent out for a certain period is called the principal or thesum.
2. Interest:

Extra money paid for using other's money is called interest.

3. Simple Interest (S.I.):

If the interest on a sum borrowed for certain period is reckoned uniformly, then it is called simple
interest.

Let Principal = P, Rate = R% per annum (p.a.) and Time = T years. Then

PxRxT
(i). Simple Intereest =
100
100 x S.I. 100 x S.I. 100 x S.I.
(ii). P = ;R= and T = .
RxT PxT PxR

Specialist Officer Model Paper (IT Professional Knowledge)


1. A Passive threat to computer security is-

(1) Malicious Intent (2) Sabotage

(3) Accidental Errors (4) Espionage Agents

(5) None of these

2. ____ allows wireless mobile devices to access the Internet and its services such as the Web and e-mail.

(1) TCP/IP (2) Ethernet

(3) WAP (4) Token ring

(5) None of these

3. DOS floppy disk does not have____.

(1) A Boot Record (2) A File Allocation Table

(3) A Root Directory (4) Virtual Memory

(5) BIOS

4. MICR technology used for clearance of cheques by banks refers to ____.

(1) Magnetic Ink Character Recognition


(2) Magnetic Intelligence Character Recognition

(3) Magnetic Information Cable Recognition

(4) Magnetic Insurance Cases Recognition

(5) None of these

5. All the information collected during database development is stored in a ____.

(1) repository (2) data warehouse

(3) RAD (4) CASE

(5) None of these

6. The ____ component is used by the data analyst to create the queries that access the database.

(1) data extraction (2) end-user query tool

(3) end-user presentation tool

(4) data store (5) None of these

7. The altering of data so that it is not usable unless the changes are undone is ____.

(1) Biometrics (2) Compression

(3) Encryption (4) Ergonomics

(5) None of these

8. The word FTP stands for-

(1) File Transfer Protocol (2) File Transit Protocol

(3) File Typing Protocol (4) File Transfer Protocol

(5) None of these

9. This ____ tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.

(1) Client

(2) Applications/Web server

(3) Enterprise server (4) DBA

(5) None of these

10. A DVD-RAM is similar to a ____, except it has storage capacities up to 5.2 GB.

(1) CD-R (2) Floppy disk

(3) CD-RW (4) Hard disk

(5) None of these

11. All of the following are basic principles of networks, except-


(1) each computer must have a network card

(2) there must be communications media connecting the network hardware devices

(3) there must be at least one connecting device

(4) each computer must have software that supports the movement of information

(5) None of these

12. ____ are used to identify a user who returns to a Website.

(1) Cookies (2) Plug-ins

(3) Scripts (4) ASPs

(5) None of these

13. If you wanted to locate the hardware address of a local device, which protocol would you use?

(1) ARP (2) RARP

(3) ICMP (4) PING

(5) PONG

14. The term, hypertext means-

(1) Non-sequential writing (2) Hypermedia

(3) Blinking text

(4) Text with heavy formatting

(5) None of these

15. Which kind of lock includes a keypad that can be used to control access into areas?

(1) Cipher (2) Warded

(3) Device (4) Tumbler

(5) Type lock

16. What is the name of protocol used in eliminate loops?

(1) Switching (2) ISL

(3) Frame tagging (4) Spanning Tree Protocol

(5) None of these

17. In networking terminology UTP means

(1) Unshielded Twisted Pair

(2) Ubiquitous Teflon Port

(3) Uniformly Terminating Port


(4) Unshielded T-Connector

(5) None of these

18. In OSI network architecture, the dialogue control and token management are responsibility of-

(1) Session layer (2) Network layer

(3) Transport layer (4) Data link layer

(5) None of the above

19. A C data structure called a structure is a group of items in which each item is identified by its own identifier, each of
which is known as a member of a structure. Member is also known as-

(1) Information (2) Field

(3) Record (4) Data type

(5) None of these

20. Multithread means-

(1) Program do more than one thing at a time

(2) More than one program do one thing at a time

(3) Both are correct (4) Both are incorrect

(5) None of these

21. A page fault occurs?

(1) when the page is not in the memory

(2) when the page is in the memory

(3) when the process enters the blocked state

(4) when the process is in the ready state

(5) None of these

22. Each packet contains the full source and destination address. This statement indicates which of the following?

(1) Virtual Circuit (2) Datagram

(3) Data link (4) FDDI

(5) None of these

23. Data bus is-

(1) Unidirectional (2) Bidirectional

(3) Both (1) & (2) (4) Multidirectional

(5) None of these


24. Which of the following is a type of ISDN (Integrated Service Digital Network)?

(1) Narrow bank (2) Broad band

(3) Both (1) & (2) (4) Virtual Circuit

(5) None of these

25. Which of the following is a browser to view a web page?

(1) Mosaic (2) Netscape

(3) Internet Explorer (4) All of the above

(5) None of these

26. A graph is a collection of-

(1) Row and columns (2) Vertices and edges

(3) Equations (4) Identity

(5) None of these

27. CDMA is used in-

(1) Wireless and local loop

(2) Allocating a wireless channel

(3) Both (1) & (2) (4) Local loop

(5) None of these

28. Number of arcs incident to a node is called its-

(1) Level (2) Predecessor

(3) Degree (4) Successor

(5) None of these

29. OSPF means-

(1) Open shortest path finite protocol

(2) Open shortest path finite protocol

(3) Open slotted path finite protocol

(4) Open slotted path first protocol

(5) None of these

30. Binding the same name to multiple operations whose signatures differ in number or types of arguments?

(1) Overloading (2) Origin class

(3) Object model (4) Package


(5) None of these

31. What is the name of the chip which has more than one processor on it?

(1) Parallel chip (2) Multi-processor chip

(3) Transputer (4) Parallel processor

(5) None of these

32. In windows-

(1) Docking views may be docked

(2) Docking views may be float

(3) Docking views may be docked or float

(4) All of the above (4) None of these

33. ____ performs relocations function?

(1) Absolute loader (2) Direct linking loader

(3) Relocating loader (4) Linkage editor

(5) None of these

34. A central computer surrounded by one or more satellite computers is called a-

(1) Bus network (2) Ring network

(3) Star network (4) All of the above

(5) None of these

35. Segmentation

(1) is a memory management scheme that supports user view of memory

(2) logical address space is collection of segments

(3) logical address consists of two tuple < segment-number, offset>.

(4) All of the above (5) None of these

36. Which of the following is a major component of the telephone system?

(1) Local loop (2) Trunks

(3) Switching office (4) All of these

(5) None of these

37. Function is invoked by-

(1) Function (2) Declaration

(3) Definition (4) Prototype


(5) None of these

38. The ACCEPT command in SQL?

(1) Creates a customized prompt when accepting user input

(2) Explicitly defines a NUMBER or DATE data type variable

(3) Hides user input for security reasons

(4) All of the above

(5) None of these

39. How many fields are required to represent a header node of a graph?

(1) 3 (2) 2

(3) 4 (4) 5

(5) None of these

40. Which of the following is not used as a data structure?

(1) Array (2) Linked list

(3) Graph (4) Directory

(5) None of these

41. Which of the following is an operating system call?

(1) CREATE (2) LINK

(3) SYSTEM (4) All of these

(5) None of these

42. In C++, by default, the members of a class are-

(1) Public (2) Private

(3) Both public and private (4) Only Public

(5) None of these

43. In core banking systems:

(1) Store and forward of transaction is done

(2) Branch server is not required

(3) Local database is not required

(4) Transaction cannot happen from a non-home branch

(5) None of these

44. MV command in Unix changes-


(1) Only the directory

(2) Only the directory entry and i-node

(3) Only the i-node number

(4) All of the above (5) None of these

45. E-Commerce refers to-

(1) Electrical commerce (2) Electronic commerce

(3) Evolutionary commerce

(4) Effective commerce (5) None of these

46. Graphs can be implemented using-

(i) Arrays (ii) Linked list (iii) Stack (iv) Queue

(1) (i), (ii) and (iv) (2) (i), (ii) and (iii)

(3) (ii) and (iii) (4) (i) and (iv)

(5) None of these

47. Thrashing-

(1) Always occur on large computers

(2) is a natural consequence of virtual memory systems

(3) Can always be avoided by swapping

(4) Can be caused by poor paging algorithm

(5) None of these

48. The process of converting analog signals into digital signals so they can be processed by a receiving computer is
referred as-

(1) modulation (2) demodulation

(3) synchronizing (4) digitizing

(5) None of these

49. The relational database environment has all of the following components except-

(1) Users (2) Separate files

(3) Database (4) Database administrator

(5) None of these

50. Primary key-

(1) Denote a candidate key that is chosen by the database designer as the principal means of identifying entities with
in an entity set
(2) Attributes names of all primary key are unique

(3) Primary key specification is optional and good idea to specify primary key for each relation

(4) All of the above (5) None of these

Answers:

1 1 11 4 21 1 31 3 41 4

2 3 12 1 22 2 32 2 42 2

3 5 13 1 23 2 33 3 43 1

4 1 14 2 24 3 34 3 44 1

5 1 15 1 25 4 35 4 45 2

6 2 16 4 26 2 36 4 46 4

7 3 17 3 27 3 37 1 47 4

8 4 18 1 28 3 38 4 48 4

9 2 19 2 29 1 39 1 49 2

10 3 20 1 30 1 40 4 50 4
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

You might also like