Lumbini Province, Asst. Computer Operator 2081/03/15

 

Quiz

15:00

1. Firewall examines each___that are entering or leaving the internal network.

2. ____is a network device which is used to forward data packets between devices within the network, sending packets directly to the intended device rather than broadcasting.

3. IP address version 4 has how many bits?

4. MAC address is also called

5. A client of the DNS(Domain Name System) application is referred to as____

6. LAN stands for___

7. In Wi-Fi Security, which of the following protocol is more used?

8. Which of the following malware type does not clone or replicate itself through infection?

9. Which of the following does NOT come under Social Engineering?

10. Palm scan, fingerprint scan, and iris scan are form of:

11. A firewall protects which of the following attacks?

12. When was Digital Nepal Framework Issued by government?

13. Which of the following can NOT be achieved by the digital signature in symmetric key encryption?

14. According to Electronic Transaction Act, 2063 a system that creates a secured key-pair consisting of a private key creating a digital signature and a public key to verify the digital signature is called:

15. पत्रको माध्यमबाट एक कार्यालयबाट अर्को कार्यालयमा विभिन्न बिषयको सन्दर्भमा जानकारीका लागि सम्पर्क गर्ने कृयाकलापलाई के भनिन्छ ?

16. मातहतका सबै कार्यालयलाई एकै बिषयको जानकारी लिखित रुपमा दिनुलाई_____भनिन्छ ?

17. नेपालको संविधानमा व्यवस्था भए बमोजिम नेपाल सरकारको प्रादेशिक बजेट कहिले प्रस्तुत गर्ने प्रावधान रहेको छ ?

18. नागरिक बडापत्रको सुरुवात कहिलेबाट भएको हो ?

19. निजामति सेवा ऐन, २०४९ अनुसार तलका मध्ये कुन अवस्थामा निजामती कर्मचारीलाई नसिहत दिने विभागीय सजाय हुन सक्ने व्यवस्था रहेको छ ?

20. A Computer is said to have 2048K memory. What does the letter K stand for?

21. The correct order of the major functions of the computer is:

22. ___is the interpreted programming language.

23. Two or three characters appended to a filename separated by a period is called a/an___

24. Which of the following coding standards provides a unique number for every character of all the language?

25. Which DOS command divides the blank disk surface into sectors and assigns a unique address to each one?

26. The category of operating system that you most likely have running on your PDA computer is known as___

27. ____is the function of operating system.

28. Which of the following is a part of operating system?

29. Which of the following operating system doesn't support multiple programs at a time?

30. Which of the following is not a font style?

31. How many margins are there on a page?

32. How can you insert formatted table in MS Word?

33. What does EXT indicator on status bar of MS-Word indicate?

34. If you want to keep track of different editions of a document which feature will you use?

35. Which is invalid document type in mail merge process in MS Word?

36. Which key is used to spell check and grammar check in a document?

37. To protect a worksheet, you can choose 'Protection' and the protect sheet from____menu.

38. What is integer value of 5/4+7*0.5+A1 were A1=1.75?

39. The shortcut key of toggle filter in MS Excel is:

40. What is the purpose of the TRANSPOSE function in Excel?

41. Multiple calculations can be made in a single formula using___

42. How can you break long text into many lines within a cell?

43. The shortcut key to display default chart for the selected range of data in a separate chart sheet is:

44. Microsoft Access belongs to___

45. Which data type in MS Access stores the binary data?

46. A key(fields) which is made up of two or more fields to uniquely identify records is known as___

47. The handout master contains placeholders for all of the following except___

48. ___is visual effects that occur when moving from one slide to another during a presentation.

49. The arrangement of elements such as Title and subtitle Text, Picture, Tables etc. called:

50. Select the most common internet Protocol?

Post a Comment

Previous Post Next Post