Search This Blog

Showing posts with label IBPS. Show all posts
Showing posts with label IBPS. Show all posts

Wednesday, November 9, 2011

COMPUTER KNOWLWDGE FOR BANK EXAMS


1. ----- Controls access to the resources on a network
a) Server
b) Client
c) Both (a) and (b)
d) None of the above

2. The wider the bus, the ---- the transfer of data
a) Greater the number of transfer steps required and the slower
b) Greater the number of transfer steps required and the faster
c) Fewer the number of transfer steps required and the slower
d) Fewer the number of transfer steps required and the faster

3. A micro second is --- of a second
a) One-trillionth
b) One-millionth
c) One-billionth
d) None of the above

4. The ---- format works best for images that have only a few distinct colors
a) GIF
b) MPEG
c) JPEG
d) Both (b) and (c)

5. Some large businesses use ---- to open communications among employees, customers, and/or vendors
a) Blog
b) Mails
c) LAN Network
d) None of the above

6. When the computers power is turned off ---- memory does not lose its contents
a) Volatile
b) Non-volatile
c) Cache memory
d) Flash memory

7. --- Is needed to access accounts, to pay the bills, to transfer money from one account to another account
a) On-line Banking facility
b) Good relations with customers
c) Both (a) and (b)
d) None of the above

8. Which of the following is used as storage locations both the ALU and in the control sections of a computer?
a) Accumulator
b) Register
c) Adder
d) Decoder

9. Accumulator is a ?
a) Hardwired unit
b) Sequential circuit
c) Finite state machine
d) Register

10. Which memory is non-volatile and may be written only once?
a) RAM
b) EPROM
c) EEPROM
d) PROM

11. The communication mode that supports data in both directions?
a) Simplex b) Half-duplex
c) Full-duplex
d) None of the above

12. To connect a computer with a device in the same room, you might be likely to use?
a) Coaxial cable
b) Optical fiber
c) Wireless
d) None of the above

13. A table consists of?
a) Fields and columns
b) Rows and columns
c) Rows and cells
d) None of the above

14. Which of the following is an advantage of the database approach?
a) Elimination of data redundancy
b) Ability to associate related data
c) Increase security
d) All of the above

15. When the same data field is stored more than once in a file, then it leads to?
a) Data redundancy
b) Data inconsistency
c) Both (a) and (b)
d) None of the above

16. ----Means database updating
a) Changing the file structure
b) Re-organizing the database
c) Modifying or adding records
d) All of the above

17. Which of the following is the descending order of data hierarchy?
a) File-Database-Field-Record-Byte-Bit
b) Database-File-Record-Field-Byte-Bit
c) Database-Record-File-Field-Byte-Bit
d) Database-Field-File-Record-Bit-Byte

18. Which of the following groups contains graphical file extensions
a) JPG, CPX, GCM
b) GIF, TCF, WMF
c) TCP, JPG, BMP
d) JPG, GIF, BMP

19. A package, which can be used for a short period before purchasing, it is termed as?
a) Try and Buy
b) Freeware
c) Shareware
d) Borrow ware

20. Which one of the following is the main function of a driver file?
a) Useful to open windows
b) Enables a specific device to work
c) To re-start the system
d) To activate the system

21. A proxy server is used as the computer?
a) With external access
b) Acting as a backup
c) Performing file handling
d) Access user permissions

22. ---- Prevents external access to a system
a) Gateway
b) Firewall
c) Router
d) Switcher

23. A list of rules for transferring data over a network is called?
a) Protocol
b) Program code
c) Rules
d) Flowchart

24. Which of the following is a valid e-mail address?
a) Authors.sakshi@gmail.com
b) @Gmailsakshi.authors.com
c) Both (a) and (b)
d) None of the above

25. Which of the following is not a network topology?
a) Star
b) Bus
c) Linear
d) Ring

26. ---- Types of virus that stays permanently in the RAM memory
a) Resident
b) File infectors
c) Boot virus
d) Macro virus

27. ---- Is the Virus that overwrite the files or a few parts being replaced?
a) Resident
b) File infectors
c) Boot virus
d) Macro virus

28. In 1983, this person was the first to offer a definition of the term 'computer virus'?
a) MC Fee
b) Smiths
c) Cohen
d) Norton

29. If you see a small red triangle in the top right corner of a cell, it means there is something attached to the call. What is it?
a) A comment
b) An attachment
c) An error
d) None of the above

30. Which function would be the best to use to calculate the payout value of a term deposit?
a) FV
b) NPV
c) IRR
d) PV

31. Sigma button is used for?
a) Totaling a Column or row
b) It is a mathematical function
c) Subtracting
d) None of the above

32. What is the correct syntax for typing a function into a cell?
a) Equal sign, Function Name, Matching brackets
b) Function Name, Equal sign, Matching brackets
c) Equal sign, Matching brackets, Function Name
d) None of the above

33. What does 'ctrl +esc' do if I am at the desktop?
a) Shows the start menu
b) Shows the format menu
c) Shows the tools menu
d) Shows the insert menu

34. In most Microsoft programs, what does 'alt+f4' do?
a) Ends the program
b) Opens the program
c) Run the program
d) Modify the program

35. In MS-Word 'alt+shift+d' does what?
a) Automatically inserts the date
b) Inserts the time
c) Inserts the day
d) None of the above

36. ---- Deletes an item immediately without placing it in the recycle bin.
a) Shift +enter
b) Shift +delete
c) Shift +right arrow
d) Shift +left arrow

37. --- Function key refreshes the current window
a) F5
b) F6
c) F7
d) F8

38. To minimize all open windows and display the desktop?
a) Windows logo +D
b) Windows logo + E
c) Windows logo + F
d) Windows logo + G


Saturday, November 5, 2011

COMPUTER KNOWLEDGE FOR BANK EXAMS


1. Buffer is device/storage area–
1. Where data are temporarily stored
2. Where data is permanently stored
3. Where data error occurs
4. All of the above
5. None of these

2. A network geometric arrangement in which a single connecting line is shared by a number of nodes is called–
1. Car Topology
2. Bus Topology
3. Truck Topology
4. All of the above
5. None of these

3. An error in a computer program is referred as–
1. Bug
2. Bit
3. Virus
4. All of the above
5. None of these

4. Circuits that provide a communication path between two or more devices of a digital computer system is–
1. Car
2. Bus
3. Truck
4. All of the above
5. None of these

5. A fixed number of adjacent bits that represent a particular character or symbol are referred as–
1. Byte
2. Octal
3. Bubble
4. All of the above
5. None of these

6. Cache memory is a–
1. Small buffer storage
2. Permanent storage
3. Main memory
4. All of the above
5. None of these

7. The total number of digits (symbols) available to represent numbers in a positional number system is referred as–
1. Number system
2. Base
3. Power
4. All of the above
5. None of these

8. Cache memory is–
1. Smaller and faster than main storage
2. Bigger and slower than main storage
3. Smaller but slower than main memory
4. Bigger and faster than main memory
5. None of these

9. Cache memory–
1. Is a Static RAM
2. Increases the speed of processing by making current programs and data available to the CPU at a rapid rate
3. Both 1. and 2. are true .
4. Both 1. and 2. are false
5. None of these

10. Following is false for BASIC–
1. Beginners All-Purpose Symbolic Instruction Code
2. High-level interactive programming language
3. Works in time sharing environment
4. Low level object oriented language
5. None of these

11. A unit for measuring data transmission speed that describes the capacity of a carrier is referred as–
1. Baud
2. Bit
3. Bond
4. All of the above
5. Batch

12. A process of trying out a new product by independent users before it is finally manufactured/developed–
1. Alpha test
2. Beta Test
3. Gamma test
4. All of the above
5. None of these

13. A selection, choice, or condition involving two possibilities is referred as–
1. Unary
2. Binary
3. Octal
4. All of the above
5. None of these

14. Base band System is–
1. A networking system
2. Where the channel support a single digital signal
3. Both 1. and 2. are true
4. All of the above
5. None is true

15. One of the early coding systems, based on the idea of converting each digit of a decimal number into its binary equivalent rather than converting the entire decimal value into a pure binary form is–
1. ASCII code
2. BCD
3. ASCII-8
4. All of the above
5. None of these

16. In Batch processing–
1. Several computer programs runs one after another without human interaction to run each program individually
2. Several computer programs runs one after another with human interaction to run each program individually
3. Selected computer programs runs one after another with human interaction to run each program individually
4. All of the above
5. None is true

17. BISYNC is–
1. Binary synchronous
2. A process of transmitting data
3. A half-duplex, character oriented, synchronous data communication transmission method
4. All of the above
5. None of these

18. A device that is used to transmit data from one location to another is referred as–
1. Storage
2. Memory
3. Carrier
4. All of the above
5. None of these

19. Programs developed by an outside supplier and provided to the user in a machine readable form is known as–
1. Canned programs
2. Beta program
3. Alpha program
4. All of the above
5. None of these

20. A binary numbers are represented by–
1. Digits 0 and 1
2. Digits 0, 1, ..., 8
3. Digits AB, C,...
4. All of the above
5. None of these

21. BIOS is responsible for
1. Handling the particulars of input/output operations
2. Output operations
3. Input operations
4. All of the above
5. None of these

22. BIOS is an abbreviation for–
1. Basic Input/Basic Output
2. Binary synchronous
3. Binary digit
4. All of the above
5. None of these

23. BISYNC is an abbreviation for–
1. Binary Input/Binary Output
2. Binary synchronous
3. Binary digit
4. All of the above
5. None of these

24. The overall design, construction, organiz-ation and interconnecting of the various components of a computer system is referred as–
1. Computer Architecture
2. Computer Flowchart
3. Computer Algorithm
4. All of the above
5. None of these

25. A number system with a base of two is referred as–
1. Unary number system
2. Binary number system
3. Octal number system
4. All of the above
5. None of these

Answers:

1. (1) 2. (2) 3. (1) 4. (2) 5. (1) 6. (1) 7. (2) 8. (1) 9. (3) 10. (4) 11. (1) 12. (2) 13. (2) 14. (3) 15. (2) 16. (1) 17. (4) 18. (3) 19. (1) 20. (1) 21. (1) 22. (1) 23. (2) 24. (1) 25. (2)

COMPUTER KNOWLEDGE FOR BANK EXAMS


1. A digital communication system capable of interconnecting, a large number of computers, terminals and other peripheral devices within a limited geographical area is called–
1. LAN
2. WAN
3. Internet
4. All of the above
5. None of these

2. A secondary storage device that uses a long plastic strip coated with a magnetic material as a recording medium is–
1. Magnetic tape
2. Compact disk
3. Hard disk
4. All of the above
5. None of these

3. An E-mail protocol for storage, manage-ment and change, especially in corporate offices–
1. Message handling service
2. Postal service’s
3. Data storage
4. All of the above
5. None of these


4. Which of the following is an advantage of stored programs?
1. Reliability
2. Reduction in operation costs
3. The computers becoming general-purpose
4. All of the above
5. None of these

5. Which of the following is not true for primary storage?
1. It is a part of the CPU
2. It allows very fast access of data
3. It is relatively more expensive then other storage devices.
4. Can be removed and transported.
5. All of the above

6. Function of control unit in the CPU is–
1. To decode program instructions
2. To transfer data to primary storage
3. To perform logical operations
4. To store program instructions
5. All of the above

7. Electronic spreadsheets are useful in situation where relatively .......... data must be input
1. Small
2. Large
3. No
4. All of the above
5. None is true

8. A list of options from which a program user can select anyone in order to perform a desired action is referred as–
1. Menu
2. Index
3. Directory
4. All of the above
5. None of these

9. A method whereby messages to be transmitted between computers are all sent to a central computer, which gathers them and routes them to the appropriate destination(s) is known as–
1. Message switching
2. Message delete
3. Message accept
4. All of the above
5. None of these

10. Which of the following describe one or more characteristics of a modem computer?
1. An electronic device
2. A mechanical device
3. A electro-mechanical device
4. All of the above
5. None of these

11. Combining records from two or more ordered files into a single ordered file is called–
1. Menu
2. Merging
3. Taking
4. All of the above
5. None of these

12. The ascending order of a data hierarchy is
1. Bit-byte-record-field-file-database
2. Byte-bit-field-record-file-database
3. Byte-bit-record-file-field-database
4. Bit-byte-field-record-file-database
5. All of the above

13. A LSI chip contains the entire CPU of computer except main memory is called–
1. Microprocessor
2. Hard disk
3. Input device
4. Output device
5. All of the above

14. A storage medium that loses its contents in the event of power failure is called–
1. Volatile storage
2. Non volatile storage
3. Permanent storage
4. All of the above
5. None of these

15. One-millionth of a second is referred as–
1. Microsecond
2. Millisecond
3. Hour
4. Minute
5. All of the above

16. Alternate facilities of programs, data files, hardware equipments, etc. used in case the original one is destroyed, lost, or fail to operate is–
1. Backup
2. Forehead
3. Delete
4. All of the above
5. None of these

17. One-thousandth of a second is called–
1. Microsecond
2. Millisecond
3. Hour 4. Minute
5. All of the above

18. The CPU (central processing unit) consists of
1. Input, output, and processing
2. Control unit, primary storage, and secondary storage
3. Control unit, arithmetic-logic unit, and primary storage
4. All of the above
5. None of these

19. The product of data processing is–
1. Data
2. Information
3. Software
4. Computer
5. All of the above

20. The input device used by computer is–
1. Motherboard
2. Central processing unit
3. Keyboard
4. System unit
5. All of the above

21. The structure of interconnecting of nodes of
a computer network is referred as–
1. Network topology 2. Internet
3. Local Area Network
4. Wide Area Network
5. All of the above

22. Nible is–
1. Double of byte
2. Half of byte
3. Ten times of byte
4. Five times of byte
5. All of the above

23. Multiprogramming is the–
1. The inter-leaved execution of two or more different and independent programs by the same computer
2. The execution of single by the different computers
3. The inter-leaved execution of two or more different and independent programs by the different computers
4. All of the above
5. None of these

24. A facility available in an operating system that allows multiple functions from the same application package is referred as–
1. Multi-threading
2. Multi-programming
3. Multi-processing
4. All of the above
5. None of these

25. Narrowband channel is a communication channels–
1. That handle low volumes of data
2. Used mainly for telegraph lines and low
speed terminals
3. Both 1. and 2.
4. All of the above
5. None of these

26. Following is the example of Network–
1. LAN
2. WAN
3. Internet
4. All the above
5. None of these

27. Peer-to-peer is a description–
1. Of communications between two dissimilar devices
2. Of communications between two equal devices
3. Of communications between two different devices
4. All of the above
5. None of these

 28. Non-document files are–
1. Pure ASCII files that can be listed for any word processing software
2. Non ASCII files that can be listed for any word processing software
3. Pure ASCII files that can be listed for specific word processing software
4. Non ASCII files that can be listed for pecific word processing software
5. All of the above

29. The method of dividing a physical channel into many logical channels so that a number of independent signals may be simultaneously transmitted on it is referred as–
1. Multithreading
2. Multiprocessing
3. Multiplexing
4. All of the above
5. None of these

30. An interconnected computer configura-tions or computers with two or more independent CPUs that have the ability to simultaneously execute several programs is called–
1. Multithreading
2. Multiprocessing
3. Multiplexing
4. All of the above
5. None of these

31. Following is not a non-impact printer–
1. Thermal printer
2. Ink-jet printer
3. Laser printer
4. Dot-matrix printer
5. All of the above

32. A number system with a base of 8 is referred as–
1. Binary
2. Decimal
3. Octal
4. All of the above
5. None of these

33. Devices converts digital signals to Sine waves at the sending end and back to digital signals at the receiving end is called–
1. Modem
2. Telephone
3. Mobile phone
4. All of the above
5. None of these

34. Dividing a project into segments and smaller units in order to simplify the analysis, design and programming effort is referred as–
1. Monitoring
2. Modular approach
3. Microprocessing
4. All of the above
5. None of these

35. The technique where digital signals are converted to its analog form for transmission over an analog facility is called–
1. Modulation
2. Digitization
3. Multiprocessing
4. All of the above
5. None of these

36. Multiprocessor is a computer system–
1. Where many CPU under a common control
2. Consisting of more than one input devices under common control
3. Where many output devices under
4. All of the above
5. None of these

37. The point at which the flow of text in a document moves to the top of a new page–
1. Page break
2. Page insert
3. Page format
4. All of the above
5. None of these

38. Technique to implement virtual memory where memory is divided into units of fixed size memory is–
1. Paging
2. De-fragments
3. Segmentation
4. All of the above
5. None of these

39. An adder where all the bits of the two operands are added simultaneously–
1. Parallel adder
2. Half adder
3. Full adder
4. All of the above
5. None of these

40. An extra bit added to a string of bits that enables the computer to detect internal errors in the transmission of binary data–
1. Parity bit
2. Byte
3. Nibble
4. All of the above
5. None of these

41. Password is–
1. Code by which a user gains access to a computer system
2. Pass for viewing movie
3. Entrance without paying something
4. All of the above
5. None of these

42. PL 1 (Programming Language One) is–
1. High level programming language
2. Low level programming language
3. Machine language
4. Assembly language
5. All of the above

43. Pascal is–
1. A high-level programming language
2. Named after Blaise Pascal
3. Named after mathematician that facilitates structured programming techniques
4. All of the above
5. None of these

44. Storage device where time to retrieve stored information is independent of address where it is stored is called–
1. Random access memory (RAM)
2. Primary memory
3. Secondary memory
4. All of the above
5. None of these

45. Octal number system has a base–
1. Two
2. Four
3. Eight
4. Ten
5. All of the above

46. Since input and output devices are on the edge of the main processing therefore they are referred as–
1. Peripheral devices
2. Processing devices
3. Personal devices
4. All of the above
5. None of these

47. A system changeover method where complete changeover to the new system takes place incrementally over a period of time is referred as–
1. Phased replacement
2. Block replacement
3. Complete replacement
4. All of the above
5. None of these

48. One trillionth of a second is–
1. Pico second
2. Mille second
3. Micro second
4. Minute
5. All of these

49. Following is of Non-vo a storage device
1. Magnetic tape
2. Compact disk
3. Floppy disk
4. All of the above
5. None of these

50. A storage medium that retains its contents even in the absence of power is referred as–
1. Non-volatile storage
2. Volatile storage
3. Secondary storage
4. Primary storage
5. None of these

ANSWERS:

1. (1) 2. (1) 3. (1) 4. (1) 5. (1) 6. (4) 7. (1) 8. (2) 9. (1) 10. (1)
11. (1) 12. (2) 13. (4) 14. (1) 15. (1) 16. (1) 17. (1) 18. (2) 19. (3) 20. (2)
21. (3) 22. (1) 23. (2) 24. (1) 25. (1) 26. (4) 27. (4) 28. (2) 29. (1) 30. (3)
31. (2) 32. (3) 33. (3) 34. (1) 35. (2) 36. (1) 37. (1) 38. (1) 39. (1) 40. (1)
41. (1) 42. (1) 43. (1) 44. (4) 45. (3) 46. (3) 47. (1) 48. (1) 49. (1) 50. (4)

Friday, November 4, 2011

BANK EXAMS COMPUTER KNOWLEDGE STUDY MATERIAL

1. Which of the following are the major components in a computer
a) CPU, CD_Rom, Mouse, Keyboard
b) Memory, Video card, Monitor
c) Modem, Printer, Screen
d) CPU, Memory, System bus, Input H/w, Output H/w

2. How the information is transformed from one component to another component in a system?
a) System bus
b) Memory
c) Keyboard
d) Monitor

3. MS-Access, MS-Foxpro is the examples of what type of software?
a) Spread Sheet
b) Presentation Software
c) Database Management
d) None of the above

4. Windows operating system have
a) Graphical User Interface
b) Command based Interface
c) Both a and b
d) None of the above

5. ___ Allows more data to be stored on a disk?
a) Data Compression
b) Disk Defragmentation
c) Both a and b
d) None of the above

6. A text-based language with codes or tags used for developing web pages is called?
a) Java
b) HTML
c) Both a and b
d) None of the above

7. CASE stands for?
a) Computer Aided Software Engineering
b) Common Aided Software Engineering
c) Computer Access Software Engineering
d) Computer Aided Software Engine

8. The primary job of the information system is?
a) Data collection
b)Data transfer
c) Transform inputs to information
d) None of the above

9. ___ Is the software that allows the computer to interact with users and hardware?
a) System Software
b) Application software
c) Development software
d) None of the above

10. This type of boot occurs when the computer is already on, and you restart it without turning off the power?
a) Generic boot
b) Live boot
c) Warm boot
d) Cold boot

11. A concentric ring on a hard disk is referred to as a?
a) Track
b) Sector
c) Table
d) None of the above

12. Which of the following best describes the purpose of generating a flowchart as part of the design of a computer program?
a) To test and maintain the efficiency of the overall program
b) To present the steps needed to solve the programming problem
c) To ensure that all methods are appropriately linked
d) To determine the necessary number of global and local variables

13. Which of the following would best facilitate the expansion of a computer program?
a) Incorporation of diagrams into the design documents
b) Minimal use of global variables in the source code
c) Construction of methods that are highly dependent on one another
d) Extensive use of functions, that support the debugging process

14. ___ Is/are the steps that tell the computer how to perform a particular task?
a) Data
b) Instructions
c) Information
d) Documentation

15. A computer contain many electric, electronic, and mechanical components known as?
a) Software
b) Input devices
c) Output devices
d) Hardware

16. ___ Is the most widely used coding scheme used to represent data
a) ASCII
b) Unicode
c) EBCDIC
d) Multi code

17. ___ Is the most common type of volatile memory?
a) ROM
b) CMOS
c) Flash Memory
d) RAM

18. A ___ is equal to approximately 1 million bytes?
a) Kilobytes
b) Mega bytes
c) Giga bytes
d) Tera bytes

19. Two categories of software are?
a) Operating System & System Software
b) Utility Programs
c) System software and Utility Programs
d) System software and Application Software

20. Notebook computers?
a) Can run on batteries or standard power supply
b) Are less expensive than a desktop with similar capabilities
c) Facilities are less
d) None of the above

21. The world's largest computer network is?
a) Internet
b) Intranet
c) LAN
d) MAN

22. Transaction Processing Systems are the basic business systems that serve which level of the organization?
a) Middle level
b) Senior level
c) Operational level
d) None of the above

23. In batch processing?
a) Transactions are processed immediately in batches
b) Transactions are accumulated in batches until it is time to process them
c) Both a and b
d) None of the above

24. Which of the following is the most powerful computer?
a) Mainframe computer
b) Micro computer
c) Super computer
d) Mini computer

25. A program written in a machine language is called ___ program?
a) Object
b) Computer
c) Assembler
d) High level

26. A collection of wires that connects several devices is called?
a) Link
b) Bus
c) Cable
d) Port

27. The fastest type of memory is?
a) Tape
b) Semi conductor memory
c) Disk memory
d) Bubble memory

28. Which of the following translator program coverts assembly level language program to object program?
a) Assembler
b) Complier
c) Micro processor
d) Linker

29. Barcodes stores information by using?
a) Dots b) Thick and thin lines
c) Both a and b
d) None of the above

30. Which of the following are the main problems in File Management System?
a) Data redundancy
b) Difficulty in updating
c) Both a and b
d) None of the above

31. In a database related fields are grouped to form?
a) Record
b) File
c) Both a and b
d) None of the above

32. Which of the following parts of a computer is necessary to enable it to play music?
a) Sound cards
b) CD-Ram
c) MIDI interface
d) Serial interface

33. Which one of the following printers is suitable for printing sprocket fed carbon copies?
a) Laser
b) Dot matrix
c) Ink jet
d) None of the above

34. To be effective a virus checker should be?
a) Replaced regularly
b) Never updated
c) Updated regularly
d) None of the above

35. Passwords enable users to?
a) Get into the system quickly
b) Make efficient use of time
c) Retain confidentiality of files
d) Simplify file structure

36. Automated transaction for the purchase of goods over the Internet is called?
a) E-Shopping
b) Web-Purchase
c) E-Commerce
d) Web-Shopping

37. Which one of the following would be the best to use to produce hundreds of letters at a time with same matter to different addresses?
a) Personal information
b) Email group
c) DTP
d) Mail merge

38. A:\ refers to?
a) A file name
b) Root directory
c) Hard drive
d) None of the above

39. Which of the following input device would be best suited to capturing images for use with a personal computer?
a) Digital camera
b) Graphics tablet
c) Touch Screen
d) Optical Mark Reader

40. The concept of "Zero Administ-ration" is associated with?
a) Network computer
b) Mini computer
c) Micro computer
d) None of the above

ANSWERS:
1) d 2) a 3) c 4) a 5) a 6) b 7) a 8) c 9) a 10) c 11) a 12) b 13) b 14) b 15) d 16) a 17) d 18) b
19) d 20) a 21) a 22) c 23) c 24) c 25) a 26) b 27) b 28) a 29) b 30) c 31) b 32) a 33) b 34) c
35) c 36) c 37) d 38) b 39) d 40) a