आपको जिस Subject की PDF चाहिए उसे यहाँ Type करे

NABARD Grade B Officer Exam Solved Question Paper Download

 

NABARD Grade B Officer Exam Solved Question Paper Download

NABARD Grade B Officer Exam Solved Question Paper Download

No:1. Dear Aspirants, Some of the Computer Awareness questions asked in the 7-3-2020 NABARD Officer Grade B Exam are listed below.

No:2. If you have any more questions from the exam, then kindly share it in the comment section.

Computer Awareness Solved Paper

Que:-1. Total number of pins present in VGA cable are

(A) 15 (B) 20

(C) 150 (D) 10

(E) 64

Explain: A Video Graphics Array (VGA) connector is a three-row 15-pin DE-15 connector. The 15pin VGA connector is provided on many video cards, computer monitors, laptop computers, projectors, and high definition television sets.

Que:-2. Keys used for performing specific tasks are known as

(A) Toggle key (B) Modifier key

(C) Function key (D) Alphanumeric key

(E) Scroll key

Explain: A function key is a key on a computer or terminal keyboard which can be programmed so as to cause an operating system command interpreter or application program to perform certain actions, a form of soft key. On some keyboards/ computers, function keys may have default actions, accessible on power-on.

Que:-3. A person who uses his expertise for develop a software is known as—

(A) Programmer (B) Security Hacker

(C) Analyst (D) None of the above

(E) Software Manager

Que:-4. What is a firewall in computer network?

(A) The physical boundary of network

(B) An operating system of computer network

(C) A system designed to prevent unauthorized access

(D) A web browsing software

(E) None of the above

Explain: In computing, a firewall is a network Security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

Que:-5. What is the maximum limit of free cloud storage on Google drive?

(A) 2 GB (B) 10 GB

(C) 15 GB (D) 20 GB

(E) 80 GB

Explain: Google provides you 15GB of free space in Google Drive, which seems like a pretty good deal compared to Dropbox's 2GB and Box's 10GB. But there's a catch that 15GB limit includes not only the Google Drive, but also Gmail account (messages and attachments) and Google Photos.

Que:-6. Which of the following is the fastest media of data transfer?

(A) Co-axial cable (B) Untwisted wire

(C) Telephone lines (D) Fiber Optic

(E) Twisted pair

Explain: Fiber-optic communication is a method of transmitting information from one place to another by sending pulses of infrared light through an optical fiber. Optical fiber is used by many telecommunications companies to transmit telephone signals, Internet communication, and cable television signals.

Que:-7. LAN can be connected by which of the following devices which operates on the data link layer?

(A) Hub (B) Bridges

(C) HDLC (D) Tunnel

(E) None of the above

Explain: Bridges connects two or more different LANs that has a similar protocol and provides communication between the devices (nodes) in them. By joining multiple LANs, bridges help in multiplying the network capacity of a single LAN. Since they operate at data link layer, they transmit data as data frames.

Que:-8. Java was introduced by among which of the following organizations?

(A) Sun Microsystem (B) IBM

(C) Intel (D) Microsoft

(E) AT&T

Explain: Java was initially developed by James Gosling at Sun Microsystems which is now a subsidiary of Oracle Corporation.

Que:-9. Which of the following is the communication protocol that sets the standard used by every computer that accesses web based information?

(A) XML (B) DML

(C) HTTP (D) HTML

(E) None of the above

Explain: HTTP_Hypertext Transfer Protocol is an application layer protocol for transmitting hypermedia documents, such as HTML. It was designed for communication between web brow sers and web servers.

Que:-10. What is the overall term for creating, editing, formatting, storing, retrieving and printing a text document?

(A) Word Processing (B) Spreadsheet design

(C) Web design (D) Database management

(E) Presentation generation

Explain: The production of type written documents (such as business letters) with automated and usually computerized typing and text-editing equipment. Other Words from word processing Example Sentences Learn More about word pro... cessing.

Que:-11. What is that computer program called which translates one program instruction at a time into machine language?

(A) Compiler (B) CPU

(C) ROM (D) Simulator

(E) Interpreter

Que:-12. Which of the following is not an in-built software application found in MS Windows?

(A) Paint (B) CD Player

(C) Disk Defragmenter (D) Volume Control

(E) MS Word

Que:-13. Which among the following terms is used for unauthorized copying of a software to be used for personal gain instead of personal backup?

(A) program thievery (B) data snatching

(C) software piracy (D) program looting

(E) data looting

Explain: The software piracy refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind is extremely common.

Que:-14. A(n) ...... is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content.

(A) email (B) virus

(C) web beacon (D) spam

(E) firewall

Explain: A web beacon is a hidden, transparent, but nonetheless 'graphic image that finds its way onto computer. It monitors the activity of users at a website for the purpose of web analytics.

Que:-15. What is the other name for addictive manufacturing?

(A) 3-D printing (B) 2-D printing

(C) CPU assembly (D) Memory management

(E) Network interconnection

Explain: Additive Manufacturing is frequently used as a synonym of 3D printing. Additive technologies are defined as the process of joining materials to make 3D objects.

Que:-16. The set of instructions which tell a computer what to do is called

(A) Matter (B) Instructor

(C) Compiler (D) Program

(E) Debugger

Explain: Software, instructions that tell a computer what to do. Software comprises the entire set of programmes, procedures, and routines associated with the operation of a computer system.

Que:-17. ER Diagram in DBMS is a graphical method used to represent,

(A) Primary key and candidate key

(B) Entity class and their relationships

(C) Objects and methods with functions

(D) Entity class and relationship to foreign key only

(E) Foreign key and Integrity constraints

Explain: An ER diagram (Entity Relationship Diagram) shows the relationship among entity sets.

Que:-18. Which of the following is true about Assembly Language?

(A) It is an object oriented programming language

(B) It is a high-level programming language

(C) It is a low-level programming language

(D) It is a language for assembling computers

(E) It is the latest flash memory language

Explain: An assembly language is a low-level programming language designed for a specific type of processor. It may be produced by compiling source code from a high-level programming language (such as C/C++) but can also be written from scratch. Assembly code can be converted to machine code using an assem bler.

Que:-19. Which of the following is a programming language for creating special programs like applets?

(A) Java (B) cable

(C) domain name (D) Net

(E) COBOL

Explain: An applet is a Java program that can be embedded into a web page. It runs inside the web browser and works at client side.

Que:-20. The two ways to arrange multiple windows on the desktop are

(A) cascade and tile (B) drag and drop

(C) point and click (D) minimize and maximize

(E) copy and paste

Explain: Cascade and tile are two ways to arrange multiple windows on the desktop.

Suggested : Who Discovered Telephone and When ?

No comments:

Post a Comment