Computer Knowledge Quiz for NABARD Grade-A Exam: 5th April 2018

Dear Aspirants,


As NABARD exam is approaching, you must practice and pay attention to all the subject and section to maximise your score in the final exam. Computer Knowledge section can help you to improve your overall score if in case other sections are tougher than the expectation. Solve or Answer these 15 Computer Knowledge Questions to test your preparation for NABARD Grade-A and other upcoming Bank Exams of 2018.

Q1. Which of the following diagrams graphically represents an inter-relationship among entities in a database?
(a) Entity-relationship diagram
(b) Data flow diagram
(c) Control flow diagram
(d) Sequence diagram
(e) None of these

Show Answer
S1. Ans.(a) Sol. A relationship is an association among entities. We can use the Entity-Relationship Diagram (ERD) to represent an inter-relationship between the entities of a database.

Q2. Which of the following keys is a field in one table that is used as a primary key field in another table?
(a) Primary key
(b) Foreign key
(c) Candidate key
(d) Identity key
(e) None of these

Show Answer
S2. Ans.(b) Sol. Foreign key is a field in one table that is used as the primary key in another table. Whenever a relationship is created between two tables, a common field acts as the primary key in the first table and the foreign key in the second table.

Q3. By what name are two or more fields of a database table called when they are collectively used to specify the primary key?
(a) Composite key
(b) Primary key
(c) Foreign key
(d) Candidate key
(e) Identity key

Show Answer
S3. Ans.(a) Sol. Composite key is formed when two or more fields of a database table are combined together in order to uniquely identify the records stored in the table.

Q4. A database table has two fields or columns that can be selected as the primary key. The first field or column will always be considered as the primary key, and the second field or column is called the _____________.
(a) Primary key
(b) Candidate key
(c) Composite key
(d) Foreign key
(e) Identity key

Show Answer
S4. Ans.(b) Sol. If a table has more than one field that can be selected as the primary key, the field that is not selected as the primary key is called a candidate key.

Q5. Which of the following is not a normal form in DBMS?
(a) First Normal Form (1NF)
(b) Second Normal Form (2NF)
(c) Third Normal Form (3NF)
(d) Ninth Normal For (9NF)
(e) Boyce-Codd Normal Form (BCNF)

Show Answer
S5. Ans.(d) Sol. In DBMS, the commonly used normal forms are 1NF, 2NF, 3NF and BCNF.

Q6. Which of the following correctly describes the use of an interpreter?
(a) Convert small processes into smaller processes
(b) Convert high-level language into low-level language
(c) Convert low-level language into high-level language
(d) Manages the kernel and shell communication
(e) None of these

Show Answer
S6. Ans.(b) Sol. The interpreter is a computer program that helps in executing programs written in high-level languages without the need to compile them first.

Q7. Which of the following statements is incorrect about the UNIQUE KEY constraint?
(a) Unique key columns do not accept duplicate values.
(b) One table can have only one unique key.
(c) By default, unique key columns accept null values unless the NOT NULL constraint is specified.
(d) The same combinations of columns should not make both unique and primary keys.
(e) None of these

Show Answer
S7. Ans.(b) Sol. Since one table can have at the most one primary key to avoid duplicates in other columns of the table, unique key can be defined. We can make one or more unique keys in a single table.

Q8. In PowerPoint, _________ view displays all slides of the presentation as a thumbnail and is helpful for repositioning slides? 
(a) Slide Design
(b) Slide Sorter
(c) Slide Show
(d) Slide Master
(e) None of these

Show Answer
S8. Ans.(b)
Sol. The Slide Sorter view is a powerful feature of PowerPoint which displays all of slides of a presentation on a single screen in the form of thumbnails. In this view, you can change the sequence of the slides.

Q9. Moving a paragraph in MS-word from one place to another can be done by  which of the following actions?
(a) Select, copy
(b) Select all, cut
(c) Select, cut and paste
(d) Select, design
(e) Select all, review

Show Answer
S9. Ans.(c)
Sol. You can move a letter, word or paragraph by first selecting it, cutting it and then pasting it to the intended location.

Q10. Which of the following are tags, when placed on an animal, can be used to record and track in a database all of the animal's movements?
(a) POS
(b) RFID
(c) OCR
(d) AR
(e) MICR

Show Answer
S10. Ans.(b)
Sol. Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader's interrogating radio waves.

Q11. Which of the following statements is true for baseband signal?  
(a) It is the source signal
(b) It frequency is relatively close to zero
(c) It is a modulated signal
(d) Option (a) and (b)
(e)  None of these

Show Answer
S11. Ans.(d)
Sol. Baseband signals are the information signals that are transmitted without modulation. These signals possess low frequency relatively close to zero. 

Q12. Which of the following application layer protocols does not use UDP?    
(a) FTP
(b) VoIP
(c) DNS
(d) SNMP
(e) None of these

Show Answer
S12. Ans.(a)
Sol. Each application layer protocol uses one of the transport layer protocols for transmitting data from one end to another. UDP is an unreliable protocol that does not provide any acknowledgment for the receipt of the data. Therefore, the application layer protocols that require reliable connection use TCP as the transport protocol. FTP is one of the application layer protocols that uses TCP.

Q13. Routing is done at the ____________.  
(a) Data link layer
(b) Network layer
(c) Transport layer
(d) Session layer
(e) Physical layer

Show Answer
S13. Ans.(b)
Sol. Routing is the process of transmitting frames of data among networks. This service is provided by the network layer. The network layer is also responsible for controlling subnets.

Q14. Which of the following is a loopback address?  
(a) 125.0.0.0
(b) 127.0.0.1
(c) 255.0.0.0
(d) 255.0.0.1
(e) None of these

Show Answer
S14. Ans.(b)
Sol. Loopback address is a special IP address that is 127.0.0.1 used for testing the connection on the same machine.

Q15. A computer stores data in the ________ format.
(a) Hexadecimal
(b) Decimal
(c) Octal
(d) Binary
(e) None of these

Show Answer
S15. Ans.(d)
Sol. A computer stores data in the binary form that is in the form of 0’s and 1’s.

You may also like to read: