Computer Knowledge Quiz for NABARD Grade-A Exam: 11th April 2018

Dear Aspirants,

As NABARD exam is approaching, you must practice and pay attention to all the subject and section to maximise your score in the final exam. Computer Knowledge section can help you to improve your overall score if in case other sections are tougher than the expectation. Solve or Answer these 15 Computer Knowledge Questions to test your preparation for NABARD Grade-A and other upcoming Bank Exams of 2018.

Q1. __________ ports connect special types of music instruments to sound cards.
(a) MIDI
(b) CPU
(c) USB
(d) BUS
(e) OCR

Show Answer
S1. Ans. (a)
Sol. MIDI stands for Musical Instrument Digital Interface, is a technical standard that describes a protocol, digital interface and connectors and allows a wide variety of electronic musical instruments, computers and other related devices to connect and communicate with one another.

Q2. Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information?
(a) New Disk
(b) Hard disk
(c) Permanent disk
(d) Optical disk
(e) Fiber Optics

Show Answer
S2. Ans. (b)
Sol. A hard disk drive (HDD), hard disk, hard drive or fixed disk is a data storage device used for storing and retrieving digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material. 

Q3. Choose the odd one out:
(a) Brute force attack
(b) Virtual Reality
(c) Unethical Phreaker
(d) Keystroke logging
(e) Cross-site Scripting

Show Answer
S3. Ans.(b)
Sol. Except Virtual Reality all other are obvious security threats to computers and data.

Q4. The type of threats on the security of a computer system or network are ……………………..
i) Interruption   ii) Interception     iii) Modification
iv) Creation       v) Fabrication 
(a) i, ii, iii and iv only
(b) ii, iii, iv and v only
(c) i, ii, iii and v only
(d) iii, iv and v only
(e) All i, ii, iii, iv and v

Show Answer
S4. Ans.(c)
Sol. Except Creation all other actions performed by unauthorised and suspicious person.

Q5. State whether true or false:
i) A worm mails a copy of itself to other systems.
ii) A worm executes a copy of itself on another system.
iii) A worm cannot be spread without a human action, (such as running an infected program) to keep it going.
(a) True, False, True
(b) False, True, True
(c) True, True, False
(d) False, False, False
(e) True, True, True

Show Answer
S5. Ans.(c)
Sol. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.

Q6. Which of the following would most likely not be a symptom of a virus?
(a) Existing program files and icons disappear
(b) The CD-ROM stops functioning
(c) The web browser opens to an unusual home page
(d) Odd message or images are displayed on the screen
(e) None of these

Show Answer
S6. Ans.(b)
Sol. Except option (b) all others are the symptoms of a computer virus.

Q7. VIRUS stands for___________.
(a) Vital Information Resources Under Siege
(b) Viral Important Record User Searched
(c) Very Interchanged Result Until Source
(d) Very Intelligent Resources Under Search
(e) None of these

Show Answer
S7. Ans.(a)
Sol. VIRUS stands for Vital Information Resources Under Siege.

Q8. Changing desktop wallpaper is a simple task which can be accessed through ________ section of all control panel items. 
(a) Personalize
(b) Image
(c) Graphics
(d) Windows
(e) Browser

Show Answer
S8. Ans. (a)
Sol. Wallpapers can be changed by the personalize section of all control panel items.

Q9. Different icons of application software can be found in which bar in latest version of Microsoft Windows?
(a) Start Menu
(b) Browser
(c) Status
(d) Control Panel
(e) None of these

Show Answer
S9. Ans. (a)
Sol. Microsoft re-introduced Start Menu bar and you can access various application software like paint or Word.

Q10. What does DBMS stand for?
(a) Data Management System
(b) Database Management System
(c) Database Management Server
(d) Database Maintenance Server
(e) Data Management Server

Show Answer
S10. Ans.(b)
Sol. Database Management System (DBMS) is a software application that can be used to create and maintain databases for various types of organizations. Some widespread DBMS applications are Microsoft SQL Server, Oracle, MySQL and Microsoft Access.

Q11.  Which among the following term is used for: Unauthorized copying of software to be used for personal gain instead of personal backups? 
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting

Show Answer
S11. Ans.(c)
Sol. Software piracy is the illegal copying, distribution, or use of software.

Q12. In first generation of computers, they used :
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
(e) All of the above

Show Answer
S12. Ans.(a)
Sol. In First Generation mainly batch processing operating system were used.

Q13. A computer port is a specialized outlet on a piece of equipment to which a plug or cable connects, which of the following port is used to connect video sources to TVs and monitors?
(a) 3.5mm Jack
(b) VGA
(c) USB
(d) PS/2
(e) Ethernet

Show Answer
S13. Ans.(b)
Sol. The Video Graphics Array (VGA) is one of the oldest connection standards which can still be found in large swaths of computing equipment. It was first developed by IBM and introduced in 1987. It was widely used for video cards, TV sets, computer monitors, and laptops.

Q14. Which cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms and it is particularly valuable for dynamic or highly changeable workloads? 
(a) Dynamic Cloud
(b) Advance Cloud
(c) Hybrid Cloud
(d) Sharing Cloud
(e) Combined Cloud

Show Answer
S14. Ans.(c)
Sol. Hybrid cloud is a cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms. By using a Hybrid approach, companies can maintain control of an internally managed private cloud while relying on the public cloud as needed.

Q15. Which among the following operation facilitate the operating system to allow more than one process to be loaded into the executable memory at a time and loaded process shares the CPU using time multiplexing?
(a) Process Scheduling
(b) Device queues
(c) Execution
(d) IPO Cycle
(e) Multiplexing

Show Answer
S15. Ans.(a)
Sol. The process scheduling is the activity of the process manager that handles the removal of the running process from the CPU and the selection of another process on the basis of a particular strategy. Process scheduling is an essential part of Multiprogramming operating systems. 

You may also like to read: