Lumbini Province, Computer Operator 2080/01/30

 

State public service commission
Competitive written examination for various services, assistant fifth level, computer operator posts under local government service
Date: 2080/01/30

KEY: [A]                                      
Time: 45 Minute                                   Full Mark: 100
Subject: Service Related

The KEY to the question paper must be mentioned in the answer sheet. If not mentioned, the answer sheet will be canceled. Mobile, Calculator etc. will not be used in the examination.

1. जिन्सी व्यवस्थापनको पहिलो प्रक्रिया तलका मध्ये कुन हो ?
a. खरिद योजना
b. माग संकलन
c. खरिद आदेश
d. दाखिला

2. सार्वजनिक सेवा प्रवाहलाई प्रभावकारी तुल्याउन स्थापना गरिएको हेलो सरकारको निशुल्क फोन नम्बर तलका मध्ये कुन हो ?
a. १००१
b. १००४
c. १०११
d. ११११

3. नेपालमा भित्र्याइएको पहिलो कम्प्युटर कुन हो ?
a. ICL 2950/10
b. IBM 1401
c. Facet
d. UNIVAC

4. चलानी रजिष्टरमा तलका मध्ये कुन कुरा खुलाउनु पर्दैन ?
a. पत्रको मिति
b. चलानी नं.
c. विषय
d. हस्ताक्षर गर्ने पदाधिकारीको नाम, थर

5. उत्प्रेरणाकाे दुई तत्व सिद्धान्त कसले प्रतिपादन गरेका हुन् ?
a. फ्रेडरिक हर्जवर्ग
b. अव्राहम मास्लो
c. म्याक ग्रेगर
d. जोन एडम्स

6. ___developed the basic Computer Architecture.
a. Charles Babbage
b. John Von Neumann
c. Blaise Pascal
d. Garden Moore

7. Which computer memory is used for storing program and data currently being processed by the CPU?
a. Mass Memory
b. Internal Memory
c. Non-Volatile Memory
d. PROM

8. Which of the following technology is used by hard disk drive?
a. Semiconductor
b. Laser beam
c. Magnetic disk
d. Magnetic tape

9. ___is formed when computers are networked with a switch in a LAN.
a. Bus topology
b. Ring topology
c. Star topology
d. Mesh topology

10. ___connector is used at ends of twisted pair cable to connect a NIC card and a port in a switch.
a. RJ 45
b. BNC
c. HDMI
d. USB

11. The program embedded on chip is called.
a. Live ware
b. Firmware
c. Shareware
d. Operating system

12. Which of the following term refers to the physical path over which a message travels in a computer network?
a. Path
b. Medium
c. Route
d. Protocol

13. Conversion of an octal number 20s to its binary number is:
a. 100002
b. 101112
c. 101102
d. 111102

14. FAT stands for:
a. File Accommodation Table
b. File Access Table
c. File Allocation Table
d. File Activity Table

15. Which command will be used to display a file within the specified directory of pathname?
a. Dir\pathname
b. Dir\pathname\pathname
c. Dir\Ch
d. Dir\pathname\filename

16. Which of the following is a component of Microsoft window that enables to view and change system setting?
a. Windows control
b. Control panel
c. Windows setting
d. Windows panel

17. Windows control panel is used for:
a. Removing hardware and software
b. Controlling user accounts
c. Accessing network setting
d. All of the above

18. Which of the following is not of the merge process?
a. Sort the data source records
b. Merge the two files to print to create a new document
c. Edit a data source
d. Format a main document

19. Which of the following command can be used to access the font size tool on formatting toolbar?
a. Ctrl + S
b. Ctrl + Shift + S
c. Ctrl + P
d. Ctrl + Shift + P

20. Which of the following typically appear at the end of document for citation of source?
a. End note
b. Footnote
c. Header
d. Footer

21. Superscript, subscript, outline, emboss, engrave are known as:
a. Font style
b. Font effects
c. Word art
d. Text effects

22. Which of the following can be picked as reference type while inserting a cross-reference?
a. Bookmark
b. Footnote
c. End note
d. All of the above

23. Search a text to change and replace it with something other can be done by:
a. Ctrl + F
b. Ctrl + H
c. Ctrl + C
d. All of the above

24. Which of the following security technique helps to maintain integrity of a document?
a. File password
b. Digital signature
c. File encryption
d. All of the above

25. Header and footer are visible in:
a. Draft view
b. Normal view
c. Page layout view
d. Print layout view

26. What happens when dollar sign ($) is entered in a cell address? (e$B$2: $B$10)
a. An absolute cell address is created
b. Cell address will change when it is copied to another cell
c. The sheet tab is changed
d. The status bar does not display the cell address

27. When a number does not display the cell address
a. ###
b. #DIV/01
c. #Name?
d. All of the above

28. The formula "=Counta (value1, value2___) counts the number of cells in a range that:
a. Are not empty
b. Contains numbers
c. Empty cells
d. Contain text

29. Identify the invalid method of editing the cell content:
a. Press the F12 key
b. Press the Alt key
c. Double click the cell
d. Click the formula bar

30. You can specify ___ to format a cell value as currency:
a. Currency symbol
b. Decimal places
c. Decimal places and currency symbol
d. Neither currency symbol nor decimal places

31. What is the universal file format for importing and exporting in Excel?
a. XML
b. CSV
c. SPSS
d. Text

32. Generating series of numbers/specific sequential number codes can be done manually by:
a. Selecting two numbers that are in the right sequences
b. Dragging the file handle to the end of the number range
c. Use the ROW function together with the TEXT function
d. All of the above

33. Which of the following ways filter data from Pivot table?
a. Inserting slicer
b. Using auto filter
c. Using report filter
d. All of the above

34. Which of the following search of table for a particular value and then find the associated value in the same rows, but different columns?
a. VLOOKUP
b. CONCATENATE
c. SUMIFS
d. All of the above

35. A composite key is:
a. The primary key with auto number as the field type
b. Is a foreign key that uniquely identifies records
c. Made up of two or more fields to uniquely identify records
d. None of the above

36. Which of the following command is used to delete an existing row in a table?
a. Erase
b. Drop
c. Delete
d. Remove

37. Using the keyword __ will return records in which the field value equals a defined text.
a. Like
b. Between
c. Is Null
d. Equal

38. ___is used to represent relationship between tables.
a. Primary key
b. Secondary key
c. foreign key
d. Tertiary key

39. Which is the relationship between database tables represented the case where are many people involved in each project and every person can involve more than one project?
a. One to one relationship
b. One to many or many to one relationship
c. Many to many relationship
d. None of the above

40. A ____ in access in a database object that you can use to create a user interface for a database application.
a. Form
b. Report
c. Macro
d. All of the above

41. Which of the following section does not exist in a slide layout?
a. Animation
b. Chart
c. List
d. Title

42. ___ allows to create a new presentation by selecting ready-made font and graphics effect?
a. Design template
b. Master slide
c. Animation scheme
d. Presentation template

43. HTML is what type of language?
a. Scripting language
b. Markup language
c. Programming language
d. Network protocol

44. The tag is used to add images to HTML document is:
a. <HTML>
b. <HR>
c. <HI>
d. <IMG>

45. According to Electronic Transaction Act, who appoints controller?
a. Nepal government
b. Ministry of general administration
c. Office of company register
d. Department of information technology

46. Which of the following is not major objectives of ICT Policy, 2072?
a. To create ICT easily accessible and affordable to all
b. To develop new and upgrade the existing ICT infrastructure
c. To promote good governance using ICT
d. To develop and implement 5G network all over the country

47. Which of the following is/are the provincial power?
a. Operation of radio, FM, television
b. Housing and registration fee
c. Motor vehicle tax
d. All of the above

48. Provisions related to computer offences/crimes are mentioned in:
a. The constitution of Nepal
b. Local government operation act
c. IT policy
d. electronic transaction act

49. The application of machine learning methods to a large database is called:
a. Artificial intelligence
b. Data mining
c. big data computing
d. Internet of things

50. Which of the following is/are applicable of Natural Language Processing (NPL)?
a. Speech recognition
b. Speech segmentation
c. Text to speech
d. All of the above

- The End -

Also Read

Post a Comment

Previous Post Next Post