Gandaki Province, Province Level Computer Operator 2078/11/14

 

Province Public Service Commission
Gandaki Province, Computer Operator (Province)
2078/11/14

The key to the question paper must be mentioned in the answer sheet. Failure to do so will result in cancellation of the answer sheet. Also, electronic devices like calculator and mobile will not be used in the exam.

1. The feature in word processor that enables to send same letter by addressing different persons:

a. Template

b. Mail merge

c. Hyperlinks

d. Macros

2. Gutter margin is

a. Margin that is added to left margin when printing

b. Margin that is added to right margin when printing

c. Margin that is added to the binding side of page when printing

d. Margin that is added to the outside of the page when printing

3. A computer operator needs to search all files whose file name starts with 'H' and ends in 'X'. It has an extension of docx. The correct search text is

a. H*X.doc

b. *H*X.docx

c. *H*X.*

d. H.X.docx

4. The command used by a user to create a new directory is

a. mkdir

b. dir

c. chdir

d. chkdsk

5. Which of the operating system is not open source?

a. Linux Operating System

b. Apple Macros

c. Free BSD Operating System

d. All of the above

6. ___is the process to copy data from one location and store in another location as an alternative incase the original data is lost.

a. Restore

b. Backup

c. Format

d. Delete

7. Which type of software is operating system.

a. Communication software

b. Application software

c. System software

d. Word processing software

8. Which software prevents the external access to a system.

a. Firewall

b. Gateway

c. Router

d. Virus checker

9. ___refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation and sound.

a. An executable file

b. Desktop publishing

c. Multimedia

d. Hypertext

10. Which of the following language enables storing, retrieving and manipulating data in database?

a. Java

b. CSS

c. SQL

d. Hypertext

11. The topology which requires a central controller or hub is called as

a. Mesh topology

b. Star topology

c. Bus topology

d. Ring topology

12. Which of them is not a network topology?

a. Star

b. Mesh

c. Ring

d. Peer to peer

13. The ASCII value of letter 'A' is 

a. 97

b. 67

c. 65

d. 95

14. As per the Electronic Transaction Act 2008, the digital signature and certificate may be revoked for

a. Death of the subscriber

b. Upon providing that requirement were not fulfilled completely

c. If false information were provided during issuance

d. All of the above

15. Which of the following is the high-speed memory used in computer?

a. RAM

b. Hard disk

c. Cache memory

d. BIOS

16. Pasting a website content to MS Word to reflect the style of word document's cursor can be achieved by

a. Ctrl + V

b. Ctrl + Alt + V

c. Ctrl + Shift + V

d. Alt + Shift + V

17. A computer operator is writing in Preeti font; same characters do change will being typed. The correct location to customize the setting to disable the auto change is

a. Symbols

b. Macros

c. Spelling and grammar

d. Auto correct

18. Example of computer font is

a. Bold

b. Italic

c. Arial

d. 40pt

19. The page default size is letter. It needs to be change to A4. It can be done by setting

a. Page layout

b. Ruler

c. Format painter

d. Section break

20. Choose the application which provides the facilities of word processing

a. Microsoft word

b. Open office writer

c. Word pad

d. All of the above

21. When designing an HTML page, the title bar text can be changed by using

a. <head>__</head>

b. <body><title>__</title></body>

c. <head><title>___</title></head>

d. <body><h1>__</h1></body>

22. The binary equivalent of decimal numbers 89, 625 is

a. (101 100 1.101)2

b. (1100111.110)2

c. (1111.01100)2

d. None of the above

23. Where is computer virus usually hidden?

a. Operating system

b. Application program

c. Disk driver

d. Both a and b

24. If you combine B5, B6, C5 and C6 cells, you will get a big cell. What address will be

a. B5C5

b. B5

c. C5

d. B5C5B6C6

25. To run a presentation from the slide where the slide was previously stopped at, the shortcut key is

a. Shift + F5

b. F5

c. Ctrl + Shift + F5

d. Alt + Shift + F5

26. ___is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys

a. Schema diagram

b. Relational algebra

c. Database diagram

d. Schema flow

27. How do you generate "Table of Contents" in word file?

a. Go to reference and select table of content

b. Go to reference and select update table

c. Go to insert and select table of content

d. Go to insert and select update table

28. Which of the following is related to the services provided by cloud?

a. Sourcing

b. Ownership

c. Reliability

d. Pass

29. Which of the following is not an open-source software?

a. Libre office

b. Microsoft office

c. Open office

d. VLC media player

30. FOSS is the 

a. Open-source software

b. Free and Open-Source Software

c. Proprietary software

d. Public Domain Software

31. Which cloud computing feature allows the service to change in size or volume to meet user needs?

a. Security

b. Scalability

c. Cost saving

d. Virtualization

32. Which of the following support presentation application?

a. Google slides

b. Microsoft PowerPoint

c. Libre Office Impress

d. All of the above

33. Which of the following is not the advantage of database?

a. Increased Data Dependency

b. Reduce Data Redundancy

c. Increase Data Consistency

d. Data Security

34. SQL data type to denote a character string value is:

a. Char

b. Varchar

c. Text

d. All of the above

35. Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?

a. Candidate key

b. Sub key

c. Super key

d. foreign key

36. Libre office 

a. Database Management Application

b. Word Processing Application

c. Spreadsheet Application

d. Presentation Application

37. The COUNT can be used for

a. Count Specific values

b. Count based on condition

c. Both a and b

d. None of the above

38. An operator gives a range C30:L100. The cell that does not fill in this range is:

a. J31

b. L30

c. F99

d. N33

39. When you click on a spreadsheet, a rectangular box with thick outline becomes prominent. It is called:

a. Workbook

b. Active cell

c. Cell

d. Locked cell

40. What is the output of cell containing number 456.783, when a formatted to '###'

a. 456.783

b. 456.78

c. 4.56

d. 4.78

41. To return remainder after a number is divided by a divisor in Excel, which function is used?

a. DIV ()

b. ROUND ()

c. FACT ()

d. MOD ()

42. What PowerPoint feature will you used to apply motion effects to different objects of a slide?

a. Animation Scheme

b. Slide Transition

c. Animation Objects

d. Slide Design

43. If Ram transfers ownership of a Google Docs file to Shyam. Which of the following rights is still available to Ram?

a. Change visibility options of the file

b. Permanently deleted the file

c. Edit the file

d. Share file with others

44. An image editor which is which is similar to Adobe Photoshop is:

a. NVU

b. Open Office

c. Blue Fish

d. GIMP Shop

45. Which of the following tag is used to add rows in the table?

a. <td> and </td>

b. <tr> and </tr>

c. <th> and </th>

d. None of the above

46. What should be the first tag in an HTML document?

a. <head>

b. <title>

c. <html>

d. <document>

47. The arrangement of name list in sequential order is called

a. Formatting

b. Sorting

c. Ordering

d. Listing

48. The formula to add number in cell A3 with the number in cell A4 is

a. avg (A3:A4)

b. sum (A3:A4)

c. sum (A3:A4)

d. sum (A3; A4)

49. A spreadsheet cell that is highlighted with heavy border is

a. Active cell

b. Passive cell

c. Lock cell

d. Permanent cell

50. ___is not spreadsheet program.

a. Microsoft Excel

b. Numbers

c. Libre Office Cale

d. Libre Office Impress

- The End -

Also Read

Post a Comment

Previous Post Next Post