ads

Computer Awareness for NABARD

1. Binary coded decimal (BCD) numbers express each decimal digital as
1) bit
2) byte
3) nibble
4) binary digits
5) ward
2. What happens if a worksheet is not protected?
1) It cannot be opened.
2) It cannot be saved.
3) It cannot be edited.
4) It can be edited.
5) All cells gets locked.
3. What is a Firmware?
1) A program started in RAM
2) A program started in a file
3) A program started in boot sector
4) A program started in ROM
5) None of these
4. ‘TWAIN’ is related with which of the following device?
1) Printer
2) Keyboard
3) Mouse
4) Monitor
5) Scanner
5. The Internet is an example of ________ network.
1) star
2) bus
3) hybird
4) mesh
5) ring
6. Blueprints are usually created using ________ software.
1) CGI
2) Paint
3) Draw
4) CAD
5) API
7. The power of a spreadsheet lies in its
1) cells
2) formulas
3) labels
4) worksheets
5) rows and columns
8. IP address consists of how many bits?
1) 16 bits
2) 8 bits
3) 30 bits
4) 36 bits
5) None of these
9. Which storage device is mounted on ‘reels’?
1) Floppy disk
2) CD-ROM
3) Magnetic disk
4) Magnetic tape
5) Hard disk
10. A paint program keeps track of every ________ placed on the screen.
1) image
2) object
3) pixel
4) colour
5) symbol
11. Rules of a programming language are called
1) procedures
2) calls
3) methods
4) login
5) syntax
12. A primary key can also be called a ________.
1) super key
2) candidate key
3) alternate key
4) secondary key
5) foreign key
13. Which shortcut key is used to open a new file in MS-Word?
1) ctrl + N
2) ctrl + M
3) ctrl + Y
4) ctrl + X
5) ctrl + Z
14. Bridge operates in which of the following OSI layers?
1) Physical
2) Network
3) Data link
4) Both (1) and (3)
5) Session
15. ________ printer is used for fax machines.
1) Line
2) Dot matrix
3) Laser
4) Ink jet
5) Thermal

Answers:

  1. 3; BCD code represents each decimal digit in four-bits format. One nibble = 4 bits
  2. 4; If a worksheet is not password protected, we can make changes in it.
  3. 4; Firmware is a software stored in the read-only memory (ROM) chip of the computer and executed whenever the computer has to multiply two numbers.
  4. 5; Twain is a widely used program that lets you scan an image using a scanner.
  5. 4; Internet is an example of Mesh topology. In this, each station is connected with each other.
  6. 4; Blueprints are the print of technical drawings created by using computer-aided designing (CAD).
  7. 2; Formula is a sequence of values that produces a new value from existing values.
  8. 5; IP address consists of 32 bits.
  9. 4; Magnetic tape is mounted on reels like audiotape.
  10. 3; Every image on the screen consists of pixels.
  11. 4
  12. 2; In candidate key, one key is considered as a primary key.
  13. 1
  14. 4; Bridge is applicable in physical as well as data link layer.
  15. 5
ads
Share To:

IBTS INSTITUTE

India's Leading Institution for Competitive Exams in Chandigarh visit www.ibtsindia.com

Post A Comment:

0 comments so far,add yours