HomeModel Lumbini Province, Asst. Computer Operator 2081/03/15 E-Learn June 29, 2024 0 Quiz 15:00 1. Firewall examines each___that are entering or leaving the internal network. a. Email users b. Updates c. Connections d. Data packets 2. ____is a network device which is used to forward data packets between devices within the network, sending packets directly to the intended device rather than broadcasting. a. Router b. Switch c. Hub d. Gateway 3. IP address version 4 has how many bits? a. 16 bits b. 32 bits c. 64 bits d. 128 bits 4. MAC address is also called a. Physical address b. Logical address c. Source address d. Destination address 5. A client of the DNS(Domain Name System) application is referred to as____ a. DNS server b. DNS repeater c. DNS resolver d. DNS inquirer 6. LAN stands for___ a. Local Area Net b. Local Access Net c. Local Area Network d. Local Access Network 7. In Wi-Fi Security, which of the following protocol is more used? a. WPA b. WPA2 c. WPS d. WPS2 8. Which of the following malware type does not clone or replicate itself through infection? a. Viruses b. Worms c. Rootkits d. Trojans 9. Which of the following does NOT come under Social Engineering? a. Tailgating b. Phising c. Pretexting d. Spamming 10. Palm scan, fingerprint scan, and iris scan are form of: a. Strong authentication b. Two-factor authentication c. Biometric authentication d. Single sign-on 11. A firewall protects which of the following attacks? a. Phising b. Dumpster diving c. Denial of Services(DoS) d. Shoulder surfing 12. When was Digital Nepal Framework Issued by government? a. 2075 B.S b. 2076 B.S c. 2077 B.S d. 2078 B.S 13. Which of the following can NOT be achieved by the digital signature in symmetric key encryption? a. Message authentication b. Data integrity c. Non-repudiation d. Security of the message 14. According to Electronic Transaction Act, 2063 a system that creates a secured key-pair consisting of a private key creating a digital signature and a public key to verify the digital signature is called: a. Symmetric Crypto System b. Asymmetric Crypto System c. Originator d. Key Generator 15. पत्रको माध्यमबाट एक कार्यालयबाट अर्को कार्यालयमा विभिन्न बिषयको सन्दर्भमा जानकारीका लागि सम्पर्क गर्ने कृयाकलापलाई के भनिन्छ ? a. परिपत्र b. तोक आदेश c. पत्र व्यवहार d. दर्ता चलानी 16. मातहतका सबै कार्यालयलाई एकै बिषयको जानकारी लिखित रुपमा दिनुलाई_____भनिन्छ ? a. पत्र b. आदेश c. परिपत्र d. जानकारी 17. नेपालको संविधानमा व्यवस्था भए बमोजिम नेपाल सरकारको प्रादेशिक बजेट कहिले प्रस्तुत गर्ने प्रावधान रहेको छ ? a. जेठ १५ b. असार १ c. असार १० d. साउन १ 18. नागरिक बडापत्रको सुरुवात कहिलेबाट भएको हो ? a. सन् १९८० b. सन् १९८५ c. सन् १९९१ d. सन् १९९५ 19. निजामति सेवा ऐन, २०४९ अनुसार तलका मध्ये कुन अवस्थामा निजामती कर्मचारीलाई नसिहत दिने विभागीय सजाय हुन सक्ने व्यवस्था रहेको छ ? a. अनुशासनहीन काम गरेमा b. प्रचलित कानून बमोजिम पेश्की फछर्यौट नगरेमा c. पूर्व स्वीकृति नलिई बराबर कार्यालयमा अनुपस्थित रहेमा d. प्रचलित कानून बमोजिम बरबुझारथ नगरेमा 20. A Computer is said to have 2048K memory. What does the letter K stand for? a. Kilobits b. Kilobytes c. Kilo gigs d. Kilo storage 21. The correct order of the major functions of the computer is: a. Input-Storage-Output-Process b. Input-Output-Process-Storage c. Input-Process-Output-Storage d. Input-Storage-Process-Output 22. ___is the interpreted programming language. a. C b. C++ c. Java d. Python 23. Two or three characters appended to a filename separated by a period is called a/an___ a. Status b. Identifier c. Extension d. Descriptor 24. Which of the following coding standards provides a unique number for every character of all the language? a. UNICODE b. ASCII c. Both of the above d. None of the above 25. Which DOS command divides the blank disk surface into sectors and assigns a unique address to each one? a. VER b. FORMAT c. FAT d. DEL 26. The category of operating system that you most likely have running on your PDA computer is known as___ a. Real time b. Single user, single task c. Single user, multitask d. Multiuser, Mult-Task 27. ____is the function of operating system. a. Role management b. User management c. Data management d. Process management 28. Which of the following is a part of operating system? a. Cell b. FAT c. Kernel d. Disk 29. Which of the following operating system doesn't support multiple programs at a time? a. MS-DOS b. LINUX c. UNIX d. WINDOWS 30. Which of the following is not a font style? a. Italics b. Bold c. Superscript d. Regular 31. How many margins are there on a page? a. Two (Header and Footer) b. Four (Top, Bottom, Left and Right) c. Five (Top, Bottom, Left, Right and Gutter) d. Four (Center, Top, Gutter and Header) 32. How can you insert formatted table in MS Word? a. Insert Table b. Draw Table c. Excel Spreadsheet d. Quick Tables 33. What does EXT indicator on status bar of MS-Word indicate? a. It indicates whether external text is pasted on document or not b. It indicates whether extended add-ons are installed on MS-Word or not c. It indicates whether extended selection mode is turned on or not d. None of the above 34. If you want to keep track of different editions of a document which feature will you use? a. Editions b. Versions c. Track change d. Revisions 35. Which is invalid document type in mail merge process in MS Word? a. Letter b. Email c. Envelop d. Dictionary 36. Which key is used to spell check and grammar check in a document? a. F7 b. Alt + F7 c. Ctrl + F7 d. Shift + F7 37. To protect a worksheet, you can choose 'Protection' and the protect sheet from____menu. a. Edit b. Data c. Format d. Tools 38. What is integer value of 5/4+7*0.5+A1 were A1=1.75? a. 5.75 b. 6 c. 6.5 d. 6.75 39. The shortcut key of toggle filter in MS Excel is: a. Alt + Ctrl + L b. Ctrl + Shift + L c. Ctrl + L d. Shift + L 40. What is the purpose of the TRANSPOSE function in Excel? a. Changes the case of text in a range b. Swaps the rows and columns of a range c. Converts a number of text d. Rounds a number to the nearest integer 41. Multiple calculations can be made in a single formula using___ a. Complex formula b. Relative formula c. Absolute formula d. Array formula 42. How can you break long text into many lines within a cell? a. 'Wrap text' in Format>cells b. 'Jusitfy' in Edit>cells c. 'Text Wrapping' in Format>cells d. 'Alter Text' in Format>cells 43. The shortcut key to display default chart for the selected range of data in a separate chart sheet is: a. F11 b. Alt + F1 c. Ctrl + F1 d. Both A and B 44. Microsoft Access belongs to___ a. Relational Database Model b. Object Oriented Database Model c. Object Relational Database Model d. Network Database Model 45. Which data type in MS Access stores the binary data? a. Hyperlink b. Lookup Wizard c. OLE Object d. Memo 46. A key(fields) which is made up of two or more fields to uniquely identify records is known as___ a. Primary key b. Foreign key c. Composite key d. Password key 47. The handout master contains placeholders for all of the following except___ a. Slide number b. Title c. Footer d. Header 48. ___is visual effects that occur when moving from one slide to another during a presentation. a. Slide animations b. Preset animations c. Slide transitions d. Custom animations 49. The arrangement of elements such as Title and subtitle Text, Picture, Tables etc. called: a. Layout b. Presentation c. Design d. Scheme 50. Select the most common internet Protocol? a. TCP/IP b. IPX/SPX c. HTML d. NetBEUI Submit Quiz You Might Like View all
Post a Comment