NABARD Grade ‘B’ Officers Examination-2020 Held on 07-03-2020
Computer Awareness
1. Total number of pins present in VGA cable are-
(A) 15
(B) 20
(C) 150
(D) 10
(E) 16
2. Keys used for performing specific tasks are known as-
(A) Toggle key
(B) Modifier key
(C) Function key
(D) Alphanumeric key
(E) Scroll key
3. A person who uses his expertise for develop a software is known as-
(A) Programmer
(B) Security Hacker
(C) Analyst
(D) None of the above
(E) Software Manager
4. What is a firewall in computer network?
(A) The physical boundary of network
(B) An operating system of computer network
(C) A system designed to prevent unauthorized access
(D) A web browsing software
(E) None of the above
5. What is the maximum limit of free cloud storage on Google drive?
(A) 2 GB
(B) 10 GB
(C) 15 GB
(D) 20 GB
(E) 80 GB
6. Which of the following is the fastest media of data transfer?
(A) Co-axial cable
(B) Untwisted wire
(C) Telephone lines
(D) Fiber Optic
(E) Twisted pair
7. LAN can be connected by which of the following devices which operates on the data link layer?
(A) Hub
(B) Bridges
(C) HDLC
(D) Tunnel
(E) None of the above
8. Java was introduced by among which of the following organizations?
(A) Sun Microsystem
(B) IBM
(C) Intel
(D) Microsoft
(E) AT&T
9. Which of the following is the communication protocol that sets the standard used by every computer that accesses web based information?
(A) XML
(B) DML
(C) HTTP
(D) HTML
(E) None of the above
10. What is the overall term for creating, editing, formatting, storing, retrieving and printing a text document?
(A) Word Processing
(B) Spreadsheet design
(C) Web Design
(D) Database management
(E) Presentation generation
11. What is that computer program called which translates one program instruction at a time into machine language?
(A) Compiler
(B) CPU
(C) ROM
(D) Simulator
(E) Interpreter
12. Which of the following is not an in-built software application found in MS Windows?
(A) Paint
(B) CD player
(C) Disk Defragmenter
(D) Volume Control
(E) MS Word
13. Which among the following terms is used for unauthorized copying of a software to be used for personal gain instead of personal backup?
(A) program thievery
(B) data snatching
(C) software piracy
(D) program looting
(E) data looting
14. A (n) …… is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.
(A) email
(B) virus
(C) web beacon
(D) spam
(E) firewall
15. What is the other name for addictive manufacturing?
(A) 3-D printing
(B) 2-D printing
(C) CPU assembly
(D) Memory management
(E) Network interconnection
16. The set of instructions which tell a computer what to do is called-
(A) Matter
(B) Instructor
(C) Compiler
(D) Program
(E) Debugger
17. ER Diagram in DBMS is a graphical method used to represent-
(A) Primary key and candidate key
(B) Entity class and their relationships
(C) Objects and methods with functions
(D) Entity class and relationship to foreign key only
(E) Foreign key and Integrity constraints
18. Which of the following is true about Assembly Language?
(A) It is an object oriented programming language
(B) It is a high-level programming language
(C) It is a low-level programming language
(D) It is a language for assembling computers
(E) It is the latest flash memory language
19. Which of the following is a programming language for creating special programs like applets?
(A) Java
(B) cable
(C) domain name
(D) Net
(E) COBOL
20. The two ways to arrange multiple windows on the desktop are-
(A) cascade and tile
(B) drag and drop
(C) point and click
(D) minimize and maximize
(E) copy and paste
Latest Govt Job & Exam Updates: