2077/11/15 काठमाण्डौ उपत्यका खानेपानी लिमिटेडलाई लाेक सेवा आयोगले सोधिएको बरिष्ठ Computer Operator को प्रश्न पत्र
Public
Service Commission
Kathmandu
Valley Khanepani Limited, Technical Technical, Information Technology, 5th,
Open Competitive Written Examination for the post of Senior Computer Operator
Exam
date 2077/11/15
Time: - 1 hour
KEY (A)
Mark: 100
Subject:
Service related
Multiple Choice 50 x 2 = 100 Marks
1. The invention of …….. gave birth to the much cheaper micro-computers?
(A) Transistor (B) Integrated circuit (C) Microprocessors (D) CPU
Ans. (C) Microprocessors
Explanation: The
invention of microprocessors (also called a single-chip CPU) gave birth to much
cheaper microcomputers. A microcomputer is a small, relatively inexpensive computer with
a microprocessor as its central processing unit (CPU). It includes a
microprocessor, memory and minimal input/output (I/O) circuitry mounted on a
single printed circuit board (PCB). Microcomputers became popular in the 1970s
and 1980s with the advent of increasingly powerful microprocessors.
2. Which
of the following is combined into a CPU?
(A) Input
and
Output
(B) Memory and interface device
(C) Control
unit and an arithmetic logic unit
(D)
Control unit and output device
Ans. (C) Control unit and an arithmetic logic unit
Explanation: Principal
components of a CPU include the arithmetic logic unit (ALU) that
performs arithmetic and logic operations, processor registers that supply
operands to the ALU and store the results of ALU operations, and a
control unit that orchestrates the fetching (from memory) and
execution of instructions by directing the coordinated operations of the ALU,
registers and other components..
3. ASCII
stands for
(A) American
Stable Code for International Interchange
(B) American
Standard Case for Institutional Interchange
(C) American
Standard Code for Information Interchange
(D) American
Standard Code for Interchange Information
Ans. (C) American Standard Code for Information Interchange T
Explanation:
ASCII, abbreviation of American Standard Code For Information Interchange, a
standard data-transmission code that is used by smaller and less-powerful
computers to represent both textual data (letters, numbers, and punctuation
marks) and non-input-device commands (control characters). Like other coding
systems, it converts information into standardized digital formats that allow
computers to communicate with each other and to efficiently process and store
data.
4. What
could cause a fixed disk error?
(A) No CD
installed
(B) Bad RAM
(C) Slow
processor
(D)
Incorrect CMOS settings
Ans. (D) Incorrect CMOS settings
5. BIOS
stands for?
(A) Base
Interface Operating
System
(B) Basic Input-Output System
(C) Base
Interaction for Output
System (D) Basic
Interface to Operating System
Ans. (B) Basic Input Output System
Explanation: In
computing, BIOS (an acronym for Basic Input/Output System and also known as the
System BIOS, ROM BIOS or PC BIOS) is the firmware used to perform hardware
initialization during the booting process (power-on startup), and to provide
runtime services for operating systems and programs.
6. Which
of the following memories need refreshing?
(A) SRAM
(B)
DRAM
(C)
ROM
(D) All of the above
Ans. (B) DRAM
Explanation: DRAM
memories needs refresh
Dynamic random access
memory (DRAM) is a type of memory that is typically used for data or program
code that a computer processor needs to function. DRAM is a common type of
random access memory (RAM) used in personal computers (PCs), workstations and
servers.
7. As per
Electronic Transaction Act, 2053, which organization issues digital signature
to end users?
(A) OCC
(B)
DOIT
(C) CA
(D) NTA
Ans. (A) OCC
Explanation: After
the enactment of the Electronic Transaction Act 2063 Digital Signature
Certificates are legally valid in Nepal. Digital Signature Certificates are
issued by licensed Certifying Authorities OCC under the Ministry of Science and
Technology, Government of Nepal as per the Electronic Transaction Act.
8. The ALU
of a computer normally contains a number of high-speed storage elements called.
(A) Semiconductor
memory (B)
Resisters
(C) Hard disks (D)
Magnetic disk
Ans. (B) Registers
Explanation:
The ALU of a computer normally contains a number of high-speed
storage elements called Registers.
A processor register (CPU register) is one of a small set of
data holding places that are part of the computer processor. A register may
hold an instruction, a storage address, or any kind of data (such as a bit
sequence or individual characters). Some instructions specify registers as part
of the instruction.
9. Hexadecimal
number system uses
(A) 0 to 9
and A to
F
(B) 0 to 15 (C) 0 to 10 and A to
E (D) 0 to 9
Ans. (A) 0 to 9 and A to F
Explanation: In
mathematics and computing, the hexadecimal (also base 16 or hex) numeral system
is a positional numeral system that represents numbers using a radix (base) of
16. Hexadecimal uses 16 distinct symbols, most often the symbols
"0"–"9" to represent values 0 to 9, and "A"–"F"
(or alternatively "a"–"f") to represent values 10 to 15.
10. Computer
was used in Nepal for census for the time in (B.S.)
(A) 2018
(B)
2020
(C)
2028
(D) 2030
Ans. (C) 2028
Explanation: Nepal
brought a computer for census of 2018 BS. This computer was of second
generation.
The history of computer
in Nepal is not that old since Nepal has not given any contribution in the
development of evolution of computer. It was in 2028 B.S. when HMG brought IBM
1401 (a Second Generation computer) on rent for Rs. 1 lakhs and 25 thousand per
month to process census data. Later the computer was bought by National
Computer Center (NCC). In 2038 B.S., a fourth generation computer was imported
with the aid of UNDP and UNFPA from England for 20 lakhs US dollars. Its name
was ICL 2950/10. This computer had 64 terminals and it is kept in museum now.
11. A list
of protocols used by a system, one protocol per layer, is called
(A) protocol
architecture (B) protocol stack (C)
protocol suit (D) none of the above
Ans. (B) protocol stack
Explanation:
Protocol stack is the usual name for a set of protocols. Of course it’s more
like a stack of pancakes than a stack in the usual computer science sense (i.e.
a data structure with push and pop operations), but the meaning is usually
clear from context.
12. Which
law of Nepal describe crime and punishments for Cyber Crime?
(A) Information
Technology Act
(B) Cyber
Security Act
(C) Electronic
Transaction
Act
(D)
Information Protection Act
Ans. (C) Electronic Transaction Act
Explanation: The
current legal framework on cybercrime and electronic evidence in Nepal mostly
addresses crimes against electronic and financial transactions through its
Electronic Transactions Act, 2063 (2008)/ETA and Banking Offence and Punishment
Act 2064 (2008).
13. To
create or change name of volume of disk:
(A) VOLUME
(B)
FAT
(C) NAME
(D) LABEL
Ans. (D) LABEL
Explanation: A
volume label, sometimes called a volume name, is a unique name assigned to a
hard drive, disc, or other media.
In computing, label is a
command included with some operating systems (e.g., DOS, IBM OS/2, Microsoft
Windows and ReactOS). It is used to create, change, or delete a volume label on
a logical drive, such as a hard disk partition or a floppy disk. Used without
parameters, label changes the current volume label or deletes the existing
label.
14. What is
the main function of operating system?
(A) manage
the computer resources
(B) establish
a user interface
(C) execute
and provide services for application
(D) All of
the above
Ans. (D) All of the above
Explanation: An
operating system has three main functions: (1) manage the computer's resources,
such as the central processing unit, memory, disk drives, and printers, (2)
establish a user interface, and (3) execute and provide services for
applications software.
15. Which
of the following is not related to the File Management of OS?
(A) Storage
(B)
Retrieval
(C) Sharing
and
Pairing
(D) Naming and protection of file
Ans. (A) Storage
Explanation:.
16. User-accessible
setup of configuration directives evaluated by the operating system during boot
is in
(A) AUTOEXEC.BAT
(B)
AUTOEXEC.SYS
(C) CONFIG.BAT (D) CONFIG.SYS
Ans. (D) CONFIG.SYS
Explanation: CONFIG. SYS is the
primary configuration file for the DOS, OS/2 as well
as similar operating systems. It is a special ASCII text file that contains
user-accessible setup or configuration directives evaluated by the operating
system during boot. CONFIG. SYS was introduced with DOS 2.0.
17. What do you call a small
part of taskbar that has icons of background running applications?
(A) Start
button
(B) Quick launch (C) Task bar
(D) System
Tray
Ans. (D) System Tray
Explanation:
An area on the right side
of the Taskbar on the Windows interface used to display the status of various
functions, such as speaker volume and modem transmission. Applications also
insert icons on the System Tray to give you a quick entrance into either the
application itself or some auxiliary function.
18. Which
are not the common features of Windows?
(A) It is
multitasking, multiuser and multithreading operating system
(B) It
supports virtual memory management system
(C) It
allows to schedule various tasks
(D) It is
multitasking, multi user and single threading operating system
Ans. (D) It is multitasking, multi user and single threading
operating system
19. To open
the command line of DOS in Windows, one has to execute
(A) cml
(B)
cmd
(C) acml
(D) cmdl
Ans. (B) cmd
Explanation: Click
Start.
In the Search, type cmd
(short for command), and press Enter.
20. A
system tool that improves computer performance in windows is
(A) disk
scanning (B)
backup
(C) disk
defragmenter (D) format
Ans. (C) disk defragmenter
Explanation: Microsoft
Drive Optimizer (formerly Disk Defragmenter) is a utility in Microsoft Windows
designed to increase data access speed by rearranging files stored on a disk to
occupy contiguous storage locations, a technique called defragmentation.
Defragmenting a disk minimizes head travel, which reduces the time it takes to
read files from and write files to the disk.
21. An
application that allows the user to compose and edit simple documents is known
as
(A) spreadsheet
(B) word
processor
(C) powerpoint (D)
browsers
Ans. (B) word processor
Explanation: a
word processor is a software program capable of creating, storing, and printing
typed documents. Today, the word processor is one of the most frequently used
software programs on a computer, with Microsoft Word being the most popular
word processor.
22. What is
the name of tool in MS Word used to apply same format to different character or
paragraph?
(A) Format
Painter
(B) Format
Duplicator
(C)
Format Repeater
(D) Format
Copier
Ans. (A) Format Painter
Explanation: A
feature in Microsoft Word that applies a style from one part of the document to
another. The text with the desired style (font, size, etc.) is highlighted and
Format Painter (paint brush icon) is clicked. Whichever text is highlighted
next is then changed to the desired style.
23. What do
you call the vertical separation between columns?
(A) Gutter
(B)
Margin
(C)
Index
(D) Orientation
Ans. (B) Margin
Explanation: In typography,
a margin is the area between the main content of a page and the page edges. The
margin helps to define where a line of text begins and ends. When a page is
justified the text is spread out to be flush with the left and right margins.
24. In MS-Word,
a word is known as.
(A) A
string of letters or numbers
(B) 16 or 32
bits
(C) Any
language
word
(D) None of the
above
Ans. (A) A string of letters or numbers
25. Which
of the following statements is false?
(A) You can
set different header and footer for last page of a section
(B) You can
set different header footer for even and odd pages
(C) You can
set different page number formats for different sections
(D) You can
set different header footer for first page of a section.
Ans. (A) You can set different header and footer for last page
of a section
Explanation: A
header is the common content that is displayed at the top of each page, while
the footer is common content that is displayed at the bottom of each page.
By default, all pages in
a Word document use a common header and/or footer. You can, however, customize
the document such that you have different headers and/or footers on any one or
more of the following:
· First
page
· Odd and
even pages.
26. Which
is the functions of Shift+F7 keys in MS Word?
(A) Open
the editor pane and start a spelling and grammar check
(B) Open
the thesaurus
(C) Open
the translation pane
(D) All of
the above
Ans. (B) Open the thesaurus
Explanation: Shift+F7: Open
the thesaurus. If you have a word selected when you press this combo, Word
opens the thesaurus and looks up the selected word.
27. Which
feature do you use to monitor all document changes?
(A) Edit
document (B) Spelling
check (C) Track change (D) Monitor
change
Ans. (C) Track change
Explanation: The
Track Changes function in Word allows you to keep a record of amendments made
to a document. You can then choose to accept or reject the amendments. It is a
useful tool for managing changes made by several reviewers to the same
document..
28. What
happens when dollar signs ($) are entered in a cell address?
(A) An
absolute cell address is created
(B) Cell
address will change when it is copied to another cell
(C) The
sheet tab is changes
(D) The
status bar does not display the cell address.
Ans. (A) An absolute cell address is created
Explanation: An
absolute reference in Excel refers to a reference that is "locked" so
that rows and columns won't change when copied. Unlike a relative reference, an
absolute reference refers to an actual fixed location on a worksheet. To create
an absolute reference in Excel, add a dollar sign before the row and column.
29. In
which chart, only one data series can be plotted?
(A) Pie
(B)
Line
(C)
Bar (D)
Column
Ans. (A) Pie
Explanation: Pie
charts show the size of items in one data series, proportional to the sum of
the items. The data points in a pie chart are shown as a percentage of the
whole pie. Consider using a pie chart when: You have only one data series..
30. Outline
border to the selected cells in MS Excel is applied when …….. is pressed ?
(A) Ctrl+Alt+&
(B) Ctrl+Shift+~ (C)
Ctrl+Shift+$ (D) Ctrl+Shift+%
Ans.
Explanation: To just apply thin
borders outside the selection use shortcut CTRL+SHIFT+7. Or sequential shortcut
ALT>H>B>S. You can also go to home tab.
31. In the
formula, which symbol specifies the fixed columns or rows?
(A) $
(B) *
(C)
%
(D) &
Ans. (A) $
Explanation: If
you do not want cell references to change when you copy a formula, then make
those cell references absolute cell references. Place a "$" before
the column letter if you want that to always stay the same. Place a
"$" before a row number if you want that to always stay the same.
32. The
cell pointer must be in ….. to apply goal seek command.
(A) the
changing cell whose value we need to find
(B) the
cell where target value is entered
(C) the
result cell where formula is entered
(D) None of
the above
Ans. (C) the result cell where formula is entered
Explanation: Goal
Seek is a built-in Excel tool that allows you to see how one data item in a
formula impacts another. Goal seek is a special type of what if tool
that determines which cell in a worksheet needs to change to reach the required
answer. Goal seek uses the result that you want and calculated one of the
values that you need, to achieve it.
Goal Seek requires three
components: a formula to run values through; a target value to achieve and; a
cell that it can change while testing the values. The cell to be changed must
be referred to in the formula.
33. A
collection of related data is known as.
(A) Data
Series
(B) Information
(C) Database
(D) Metadata
Ans. (C) Database
Explanation: Database
is an integrated collection of logically related records or files. A database
consolidates records previously stored in separate files into a common pool of
data records that provides data for many applications. The data is managed by
systems software called database management systems (DBMS).
34. Which
of the following is the correct order of keywords for SQL SELECT statements?
(A) SELECT,
WHERE,
FROM
(B) FROM,
WHERE, SELECT
(C) WHERE,
FROM,
SELECT
(D) SELECT,
FROM, WHERE
Ans. (D) SELECT, FROM, WHERE
Explanation: The
SQL SELECT statement returns a result set of records, from one or more tables.
A SELECT statement retrieves zero or more rows from one or more database tables
or database views. The following SQL statement selects all the customers from
the country "Mexico", in the "Customers" table: SELECT
* FROM Customers WHERE Country='Mexico';
35. What
are the columns in a Microsoft Access table called?
(A) Rows
(B)
Fields
(C)
Cells
(D) Record
Ans. (B) Fields
Explanation:
Access Tables are a grid made up of rows and columns. So, simply, a column in
an access table is also known as a field.
36. The
basic elements of a form or a report are.
(A) Controls
(B) Objects
(C) Windows
(D)
Properties
Ans. (A) Controls
37. What is
the size of Yes/No field?
(A) 1
bit
(B) 1 byte
(C) 1
kilobyte (D)
1 character
Ans. (A) 1 bit
Explanation: Fields that will contain only one of two
values, such as Yes/No, True/False, On/Off is 1 bit.
38. Which
one of the following is not the type of data validation?
(A) Uniqueness
(B) Consistent expression (C) No null values (D) All of
the above
Ans. (C) No null values
Explanation: When
setting up a workbook for your users, you may often want to control information
input into specific cells to make sure all data entries are accurate and
consistent. Among other things, you may want to allow only particular data type
such as numbers or dates in a cell, or limit numbers to a certain range and
text to a given length. You may even want to provide a predefined list of
acceptable entries to eliminate possible mistakes. Excel Data Validation allows
you to do all these things in all versions of Microsoft Excel 2016, 20013, 2010
and lower.
39. What is
the result of a query?
(A) a
field
(B) a record
(C) a
query
(D) a dynaset
Ans. (D) a dynaset
Explanation: Dynaset
- set of records that make up the answer to query request (dynamic set of
records). Dynamic because if table changes on which the query depends the
results of query will change along with it.
40. A …….
is used to make design changes to reports in MS Access.
(A) print
preview
(B) report
view
(C)
layout
view
(D) none of
the above
Ans. (C) layout view
Explanation: Layout
view is a more visually-oriented view than Design view. While viewing a form in
Layout view, each control displays real data. As a result, this is a very
useful view for setting the size of controls, or performing many other tasks
that affect the visual appearance and usability of the form.
Certain tasks cannot be
performed in Layout view and require switching to Design view. In certain
situations, Access displays a message telling you that you must switch to
Design view to make a particular change..
41. Which
of the following key can be used to view slide show?
(A) F1
(B) F2
(C) F5
(D) F10
Ans. (C) F5
Explanation: F5 is probably the most often used
function key in PowerPoint. You can quickly see how your slide show looks in
full screen.
42. What
lets you to create new presentation by selecting ready-made font color and
graphics effects?
(A) presentation
template
(B) design template
(C)
blank presentation
(D) animation scheme
Ans. (B) design template
Explanation: PowerPoint
has the ability to use templates to create presentations. These templates are
designed to give your slide presentations a consistent appearance. Templates
are ready-to-use presentations into which you put your own information. You can
use the templates provided or create your own.
43. Which
notation is used to end any HTML tag?
(A) //
(B)
/
(C)
*
(D) |
Ans. (B) /
Explanation:
slash, an end tag, in which the element name is prefixed with a slash: </
tag > . In some versions of HTML, the end tag is optional for some elements.
44. What is
the server called on the internet connection?
(A) Host
(B) Router
(C)
Hub
(D) Gateway
Ans. (A) Host
Explanation: the
term server refers to a computer program or process (running program). It
refers to a device used for (or a device dedicated to) running one or several
server programs. On a network, such a device is called a host.
45. The
correct sequence of HTML tags for starting a webpage is
(A) Head,
Title, HTML,
Body
(B) HTML, Body, Title, Head
(C) HTML,
Head, Title, Body
(D) None of
the above
Ans. (C) HTML, Head, Title, Body
Explanation: The correct sequence of HTML tags to
start a webpage is html, head, title, and body.
46. A
communication protocol used by internet is
(A) HTTP
(B)
TCP/IP
(C)
WWW
(D) HTTPS
Ans. (B) TCP/IP
Explanation: TCP
IP is one of the primary protocols of the Internet Protocol suite. It works
with and complements IP, which is why the two are often paired together as TCP
IP. TCP IP is the most widely used communications protocol..
47. Which
of the tags is used for a section heading?
(A) <title>
…… </title> (B) <h1> ……
</h1> (C) <p> …….
</p> (D) <head> ……. </head>
Ans. (B) <h1> …… </h1>
Explanation: The
heading tag is used in HTML to define headings of a page. Headings are defined
by <hn> , with “n” being a number between 1 and 6, and determines which
position a heading has in the hierarchy of the heading structure. Heading tags
have a particularly important function within an HTML structure.
48. Which
server provides a central storage facility to stores files of many users on a
network?
(A) Database
server (B) Name
server (C) File
server (D) All of
the above
Ans. (C) File server
Explanation: A
file server is a central server in a computer network that provides file
systems or at least parts of a file system to connected clients. File servers
therefore offer users a central storage place for files on internal data media,
which is accessible to all authorized clients.
49. A protocol
is a set of rules governing a time sequence of events that must take place
(A) between
peers
(B) between
modems
(C)
between an interface
(D) across
an interface
Ans. (C) between an interface
Explanation: Between
interface is A protocol is a set of rules governing a time sequence of events
that must take place.
In computing, an
interface is a shared boundary across which two or more separate components of
a computer system exchange information.
50. The
Network Topology with highest reliability is ….
(A) Bus
Topology (B)
Star Topology (C) Ring Topology (D)
Mesh Topology
Ans. (D) Mesh Topology
Explanation: A
full mesh topology provides a connection from each node to every other node on
the network. This provides a fully redundant network and is the most reliable
of all networks. If any link or node in the network fails, then there will be
another path that will allow network traffic to continue.
- The End -
Comments
Post a Comment