Computer Questions for NABARD Grade-A 2017

Dear Readers,

Computer Questions for NABARD Grade-A 2017

Computer efficiency is now important in almost every stream and computer awareness is an important section in bank recruitment Examination. Practice with these 15 questions of Computer Knowledge for NABARD Grade-A Exam 2017.

Q1. Which operation performs a set union of two ‘similarly structured’ tables?
(a) Union
(b) Join
(c) Product
(d) Intersect
(e) None of these

S1. Ans. (a)
Sol. Union operation performs a set union of two ‘similarly structured’ tables.

Q2. What is a tuple?
(a) Row
(b) Projection
(c) Field
(d) Union
(e) None of these

S2. Ans. (a)
Sol. Tuple is a row.

Q3. In relational database, a field is a:
(a) label
(b) table of information
(c) group of related tables
(d) category of information
(e) None of these

S3. Ans. (d)
Sol. A field is category of information.

Q4. Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?
(a) Candidate key
(b) Sub key
(c) Super key
(d) Foreign key
(e) None of these

S4. Ans. (c)
Sol. Super key is a set of one or more attributes taken collectively to uniquely identify a record.

Q5. Which among the following is a property of the entire relation, rather than of the individual tuples in which each tuple is unique?
(a) Rows
(b) Key
(c) Attribute
(d) Fields
(e) None of these

S5. Ans. (b)
Sol. Key is a property of the entire relation (relation is a table).

Q6. __________ ensures secure transfer of data over an unsecured network, such as the Internet.
(a) Antivirus
(b) Hacking
(c) Cracking
(d) Spoofing
(e) Cryptography

S6. Ans.(e)
Sol. In cryptography, data are sent in such a way that they look completely different from the original data. Thus, cryptography ensures secure transfer of data over an unsecured network.

Q7. The SubSeven is an example of :
(a) antivirus
(b) Spyware
(c) Spam
(d) Adware
(e) Trojan horse

S7. Ans.(e)
Sol. SubSeven is a Trojan horse program that appears or pretends to be a genuine application, but actually causes damage to the executable files on the computer.

Q8. Which among the following is the most suitable type of network spread over large span that phone lines would use?
(a) WAN
(b) PAN
(c) WWAN
(d) CAN
(e) SAN

S8. Ans.(a)
Sol. Wide Area Network (WAN) usually uses telephone lines for connectivity, as WAN is spread over a large area and offers Internet-related services such as browsing, email, chatting, etc.

Q9. What does JAR stand for?
(a) JQuerry Application Rapid-development
(b) Java Application Resolution
(c) Java Archive
(d) JQuerry Application Resolution
(e) None of the above

S9. Ans.(c)
Sol. In software, JAR (Java Archive) is a package file format typically used to aggregate many Java class files and associated metadata and resources (text, images, etc.) into one file to distribute application software or libraries on the Java platform.

Q10. Bridge is a _________ device.   
(a) layer 4
(b) layer 2
(c) layer 5
(d) layer 7
(e) layer 3

S10. Ans.(b)
Sol. A bridge is a network device used at the data link layer to connect two dissimilar networks as well as similar networks.

Q11. Which of the following cable types is called cheapernet?  
(a) Thicknet
(b) UTP
(c) SMF
(d) Thinnet
(e) STP

S11. Ans.(d)

Sol. As the installation cost of thinnet coaxial cable is less, it is also known as cheapernet.

Q12. 10BaseT uses which type of cables to connect network devices?  
(a) twisted-pair
(b) coaxial
(c) multi-mode fiber optic
(d) single-mode fiber optic
(e) Both (a) and (c)

S12. Ans.(a)
Sol. In 10BaseT, 10 means the transfer rate of this Ethernet is 10 Mbps; Base describes the type of signaling used, that is Baseband; and T denotes that the cable used is twisted -pair cable.

Q13. Which of the following is not an advantage of wireless networking?  
(a) Mobility
(b) Installation
(c) Cost effectiveness
(d) Security
(e) Both (b) and (c)

S13. Ans.(d)
Sol. A wireless network allows a user to connect different computers or devices by using wireless network protocols. It provides mobility by allowing access to a network irrespective of the location. The installation of a wireless network is easy compared to a wired network. Also, a wireless network does not required expensive wires a cables; therefore, this type of network is cost effective. However, this type of network is insecure.

Q14. Which of the following topologies does not use switches?  
(a) Bus
(b) Star
(c) Ring
(d) Mesh
(e) Hybrid

S14. Ans.(a)
Sol. In the Bus topology, all the nodes and peripherals are connected to a single cable that acts as the backbone of the network. Therefore, there is no need for a hub, switch or router for connecting nodes in this topology.

Q15. Which layer provides electrical and mechanical requirements to maintain a physical link between the end points?  
(a) Network
(b) Physical
(c) Application
(d) Data Link
(e) All of these

S15. Ans.(b)
Sol. The Physical layer handles voltage, electrical pulses, connectors and, switches so that data can be transmitted over transmission media.

You may also like to read: