PSC
Competitive Written Examination for The Post of Assistant Computer Operator (Technical), Nepal Miscellaneous Service, Gazetted Second Class, 2079-05-24
Time: 2 Hours 15 Minutes
Paper: Second
Full Mark: 100
Subject: Service Related
The answers to the following questions should be written in separate answer sheets according to the section, otherwise the answer sheet will be canceled.
1. Differentiate between firmware and cache memory.
Differentiate between firmware and cache memory are as given below.
Parameter | Firmware | Cache Memory |
---|---|---|
Definition | A piece of programming code embedded in a particular hardware. | High speed memory that increase computer performance. |
Nature | Software | Hardware |
Residence | Resides in ROM or flash memory. | Resides between main memory and CPU. |
Function | Controls hardware device. | Reduces the average time to access data from the main memory. |
Installation | Installed in h/w chip and h/w manufacturer. | Intalled by computer manufacturer. |
Alternative name | Embedded software or software for hardware. | Buffer memory. |
Example | BIOS in ROM of PC. | Different Level: L1 to L6. |
2. What do you understand by a software? Explain its types.
Software
Computer needs data and instruction to perform any task. Sequence of data or instruction given to computer to perform certain task is termed as computer program. Computer software can be defined as the set of programs. Software refers to applications, script and program that run on device.
a. Application Software
- Application software is the type of computer software that is designed to perform specific task.
- User uses application software to solve personal problem in daily life.
- Application software is used to perform a specific personal, educational and business function.
i. Packaged software
ii. Tailored software
- System software is the type of software that is designed to run on hardware and other application software.
- It controls and works with computer hardware.
i. Operating system
ii. Utility software
iii. Device driver
iv. Programming language and language processor
- Memory management - Directs memory resources to different program.
- Process management - Decides which process gets resources when and how long.
- Device management - Helps device to communicate with computer.
- Job accounting - Keep track of time and resources used by various jobs and user.
- Error detection - Traces error and display error message which helps to debug it.
- File management - Manages all the file-related activities such as organization storage, retrieval, naming, sharing and protection of files.
- Networking - Helps computer to communicate with another computer in network.
- First, we need to create data source with required fields, e.g., Name, address, contact no. etc.
- Identify or create main document with required content for letter.
- Combine the data source with main document.
- Insert required fields from data source to appropriate location in main document.
- Complete the merge process after previewing the final output which can be printed as required.
Dear <<FirstName>> <<LastName>>
We would like to thank you for being a loyal customer from <<City>>. We hope to see you at our new store opening soon!
Best regards,
The Company Team
Data source (Excel)
FirstName | LastName | City |
---|---|---|
Rohit | Chaudhary | Kolhabi |
Resulting Merge Letters
Dear Rohit Chaudhary
We would like to thank you for being a loyal customer from Kolhabi. We hope to see you at our new store opening soon!
Best regards,
The Company Team
Relative Cell Reference | Absolute Cell Reference |
---|---|
It is named after column name and row number. | It is named after column name and row number but with dollar ($) sign. |
It doesn't have dollar sign. | It has dollar ($) sign in both row and column. |
It takes formula from reference cell automatically change the value according to their relative position. | It will take reference from the only cell that is absolute. |
It is default reference. | It can be created by pressing F4 twice times. |
It is relative cell reference. | It is fixed cell reference. |
A cell can be referred just by specifying the row and column value. | It will only refer to the specific row and column. |
When formula is copied it automatically change themselves. | It won't change when the formula is copied to another cell. |
Example: A1, A2 etc. | Example: $A$1, $B$2 etc. |
System tool
System tools are built in utilities or programs in an operating system (OS) designed to help monitor, maintain, system restore, task manager, backup and recovery, device manager.
- Improves system efficiency
- Monitor performance
- Performs maintenance
- Scans the disk for fragmented files
- Re-arrange the file pieces so they stored next to each other
- Free up space and improve read/write speeds
System restore is a system tool that allows you to roll back system computer's system files and setting to a previous state without affecting personal files.
- The system creates restore points before major changes.
- You can revert your system to a selected restore point.
- System files
- Installed applications
- Windows registry setting
- Personal files (e.g. documents, photos)
7. Explain the generation of Computer with key feature of every generation in detail.
Generation of Computer
Based on the development in technology computer can be classified into different time period. This classification is known as the generation of computer. Classification of generation is based on size of computer cost, functionality, storage and memory capacity, speed, power consumption etc.
- Device/technology used: Vacuum Tube
- Language used: Machine language
- Memory: Magnetic core memory
- Input/output device: Paper tape and punched card
- Size: Very large and occupied large space
- Speed: Very slow (works in millisecond)
- Device/technology used: Transistors
- Language used: Machine language and Assembly language
- Memory: Magnetic core memory
- Size: Smaller than first generation computer
- Speed: Faster than first generation computer (works in microsecond)
- Device/technology used: Integrated circuit
- Language used: High level language
- Memory: Magnetic core/magnetic tape
- Size: Smaller than second generation computer
- Speed: Faster than second generation computer (works in nanosecond)
- Device/technology used: Microprocessor
- Language used: High level language
- Memory: RAM, ROM (Primary), Hard Disk (Secondary)
- Speed: Faster than third generation computer (works in picosecond)
- Will uses ULSI technology and bio chips
- Will be based on artificial intelligence
- Will function on natural language processing
- Will be capable of parallel processing
- Faster than other generation (works in femtosecond)
- Will recognize voice, image etc.
- Will be able to solve problems.
Pivot table
- A static tool of excel that arranges and summarizes complex data in simple tabular form.
- A basic data analysis tool that can be used to obtain desired report from large data.
- To get important summary of data from detail data.
- To find relationship within the data.
- To organize the data into a format that's easy to read.
- SUM - To get the sum of cell range. e.g., =SUM (A2, A10).
- COUNT - To count the cell with numeric value. e.g., =COUNT (A2, A10).
- AVERAGE - To get the mean value of the numbers in a particular cell range. e.g., =AVERAGE (A2, A10).
- MAX - To get the largest number in a cell range. e.g., =MAX (A2, A10).
- MIN - To get the smallest number in a cell range. e.g., =MIN (A2, A10).
9. What is primary and foreign key in database. Clarify it with examples.
Primary Key
- A field in a table which uniquely identifies each record in a database table.
- A primary key column cannot have null values.
- Does not accept duplicate values.
- One table can have only one primary key.
- A field in table that refer to the primary key of another table in relationship.
- A column or column of child table that connects to the primary key of parent table.
- Represent relationship between tables.
Roll No. | Name |
---|---|
1. | Ram |
2. | Sita |
3. | Gopal |
Roll No. | Name |
---|---|
1. | Basic |
1. | Advanced |
2. | Advanced |
2. | Diploma |
3. | Basic |
10. What is formatting and validating field data in database management system? Give an example to Illustrate.
Formatting field
- Formatting means the appearance of data to store in table
- It determines the looks of data obtained while accessed by user
- Different formatting options are available for different types of data in DBMS (based on MS-Access)
- Validating field means controlling and limiting the value that can be entered into particular field in table.
- Data type that is selected for particular field limit the type of data in some extent.
- Data validation specifies the criteria of data to be entered.
- It can also provide options and range of valid data.
- In access validation can be defined for any type of data of cell.
- E.g. validation rule '>15' defines than only numeric data larger than 15 can be entered in particular field.
Presentation System
- Application software that is used to create visual presentation composed of series of slides.
- To convey message, present or share data or information related to any topic.
- Example: Microsoft PowerPoint, Google slide.
- To provide a framework about product or service of a company.
- To build a good reputation of organization.
- Conduct training for employee of organization
- To build relation among the employee by internal communication.
- To share new ideas.
- To conduct meeting.
- To present periodic and final report.
- To present data and analyze it.
IP address
- Unique id of computer that is connected to network.
- Known as logical address of computer.
- Provides identity to computer in a network.
- Two version of IP address are available: version 4 (IPv4) and version 6 (IPv6)
- IP version 4 is made up 32 bits denoted by dotted decimal notation.
- Can be classified into 5 different classes.
- 32 bit number that break an IP address into network bits and host bits.
- Define the range of IP addresses that can be used within a network or subset.
- Represented with all 1's in the network portion and with all 0's in the host portion.
- A route or path, to which information is passed when the device does not know where the destination is present.
- An intermediate device between the local network and the internet.
- Transfers internal data to the internet and back again.
- Forwards the packet from the client to other network.
- Makes it possible for devices in one network to communicate with devices in another network.
13. What is cyber security? What are the various common security threats?
Cyber security
Cyber security is the practice of protecting systems, network devices and data from digital attacks, unauthorized access, damage or theft. It's a broad field that includes technologies processes and practices designed to defend.
Computer threat
Any negative action or event that leads to loss or corruption of data or physical damage to the hardware.
Computer virus
- A computer virus that destroys or damage data, information and program residing in the computer.
- E.g. Boot sector virus, scripting virus.
- A type of malware that gathers data from computer and forward to third party.
- E.g. Trojan horse, key logger
- A destructive malware program that replicates itself in order to spread to others computer through computer network.
- A piece of code intentionally inserted into a software system that will set of malicious function when specified conditions are met.
- Bait sent by attacker in the form of an email to encourage people to share their details.
Function and duties of controller
- To issue license to CA
- To supervise and monitor the activities of CA
- To fix standard to be maintained by CA
- To specify procedure to be followed by CA while dealing with subscriber.
- To maintain the record of information disclosed by CA
- To perform function as prescribed
- To issue a certificate to subscriber
- To suspend the certificate
- To revoke the certificate
Network topology
- Network arrangement connecting various node through line of connection
- Layout or design of the element of a communication network
- Methods in which all the elements of a network are mapped
Bus topology
- All devices share a single communication line
- Easy to install, low cost
- Difficult to troubleshoot, one cable failure can affect the whole network
- All devices are connected to a central hub or switch
- Easy to manage, failure of one device doesn't affect other
- If the hub fails, the entire network goes down
- Device are connected in a circular fashion, each device connects to each other
- Predictable performance, orderly data flow
- Failure of single node, can disturb the whole network
- Every device is connected to every other device
- High redundancy, robust and reliable
- Expensive and complex to install
- A mix of two or more topologies
- Flexible can be customized to suit needs
- Complex and potentially expensive
16. Explain about various security mechanisms in detail.
Computer security
The security technique to keep computer hardware, data and software from unauthorized access, theft, misuse is known as computer security. Various security mechanism used to protect computer system are:
- Special type of network security device or program which monitor and filter incoming and outgoing data in computer network.
- A cyber security tool that filters network traffic and prevents malicious attack.
- Intrusion Detection System is device or software application used for monitoring computer network for malicious activity, security violations and threat.
- Intrusion Prevention System is the process of stopping security threat and incident in computer network detected by IDS.
- Used to filter email and separate email into different folders based on specified criteria.
- Provides a way to organize email into different categories automatically.
- Helps to identify spam, phishing message.
- Antivirus is used to protect computer from virus and different kinds of malware.
- E.g. Norton, Kaspersky etc.
-The End-
Also Read
- Nepal Oil Corporation Computer Operator Written Exam Question Paper 2081/09/29
- Nepal Oil Corporation Computer Operator 2081/09/29
- Nepal Transport and Warehousing Computer Operator Written Exam Question Paper 2081/09/22
- Nepal Transport and Warehousing, Computer Operator 2081/09/22
- Nepal Rastra Bank, IT Assistant Written Exam Question Paper 2081/09/15
Post a Comment