Gandaki Province, Province Level Computer Operator 2078/11/14

 

Province Public Service Commission
Gandaki Province, Computer Operator(Province)
2078/11/14

The key of the question paper must be mentioned in the answer sheet. Failure to do so will result in cancellation of the answer sheet. Also, electronic devices like calculator and mobile will not be used in the exam.
1. The feature in word processor that enables to send same letter by addressing different persons:
a. Template
b. Mail merge
c. Hyperlinks
d. Macros
2. Gutter margin is
a. Margin that is added to left margin when printing
b. Margin that is added to right margin when printing
c. Margin that is added to the binding side of page when printing
d. Margin that is added to the outside of the page when printing
3. A computer operator needs to search all files whose file name starts with 'H' and ends in 'X'. It has an extension of docx. The correct search text is
a. H*X.doc
b. *H*X.docx
c. *H*X.*
d. H.X.docx
4. The command used by an user to create a new directory is
a. mkdir
b. dir
c. chdir
d. chkdsk
5. Which of the operating system is not open source?
a. Linux Operating System
b. Apple Macros
c. Free BSD Operating System
d. All of the above
6. ___is the process to copy data from one location and store in another location as an alternative incase the original data is lost.
a. Restore
b. Backup
c. Format
d. Delete
7. Which type of software is operating system.
a. Communication software
b. Application software
c. System software
d. Word processing software
8. Which software prevents the external access to a system.
a. Firewall
b. Gateway
c. Router
d. Virus checker
9. ___refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation and sound.
a. An executable file
b. Desktop publishing
c. Multimedia
d. Hypertext
10. Which of the following language enables storing, retrieving and manipulating data in database?
a. Java
b. CSS
c. SQL
d. Hypertext
11. The topology which requires a central controller or hub is called as
a. Mesh topology
b. Star topology
c. Bus topology
d. Ring topology
12. Which of them is not a network topology?
a. Star
b. Mesh
c. Ring
d. Peer to peer
13. The ASCII value of letter 'A' is 
a. 97
b. 67
c. 65
d. 95
14. As per the Electronic Transaction Act 2008, the digital signature and certificate may be revoked for
a. Death of the subscriber
b. Upon providing that requirement were not fulfilled completely
c. If false information were provided during issuance
d. All of the above
15. Which of the following is the high speed memory used in computer?
a. RAM
b. Hard disk
c. Cache memory
d. BIOS
16. Pasting a website content to MS Word to reflect the style of word document's cursor can be achieved by
a. Ctrl + V
b. Ctrl + Alt + V
c. Ctrl + Shift + V
d. Alt + Shift + V
17. A computer operator is writing in Preeti font, same characters do change will being typed. The correct location to customize the setting to disable the auto change is
a. Symbols
b. Macros
c. Spelling and grammar
d. Auto correct
18. Example of computer font is
a. Bold
b. Italic
c. Arial
d. 40pt
19. The page default size is letter. It needs to be change to A4. It can be done by setting
a. Page layout
b. Ruler
c. Format painter
d. Section break
20. Choose the application which provides the facilities of word processing
a. Microsoft word
b. Open office writer
c. Word pad
d. All of the above
21. When designing an HTML page, the title bar text can be changed by using
a. <head>__</head>
b. <body><title>__</title></body>
c. <head><title>___</title></head>
d. <body><h1>__</h1></body>
22. The binary equivalent of decimal numbers 89, 625 is
a. (101 100 1.101)2
b. (1100111.110)2
c. (1111.01100)2
d. None of the above
23. Where is computer virus usually hidden?
a. Operating system
b. Application program
c. Disk driver
d. Both a and b
24. If you combine B5, B6, C5 and C6 cells, you will get a big cell. What address will be
a. B5C5
b. B5
c. C5
d. B5C5B6C6
25. To run a presentation from the slide where the slide was previously stopped at, the shortcut key is
a. Shift + F5
b. F5
c. Ctrl + Shift + F5
d. Alt + Shift + F5
26. ___is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys
a. Schema diagram
b. Relational algebra
c. Database diagram
d. Schema flow
27. How do you generate "Table of Contents" in word file?
a. Go to reference and select table of content
b. Go to reference and select update table
c. Go to insert and select table of content
d. Go to insert and select update table
28. Which of the following is related to the services provided by cloud?
a. Sourcing
b. Ownership
c. Reliability
d. Pass
29. Which of the following is not an open source software?
a. Libre office
b. Microsoft office
c. Open office
d. VLC media player
30. FOSS is the 
a. Open source software
b. Free and Open Source Software
c. Proprietary software
d. Public Domain Software
31. Which cloud computing feature allows the service to change in size or volume to meet user needs?
a. Security
b. Scalability
c. Cost saving
d. Virtualization
32. Which of the following support presentation application?
a. Google slides
b. Microsoft PowerPoint
c. Libre Office Impress
d. All of the above
33. Which of the following is not the advantage of database?
a. Increased Data Dependency
b. Reduce Data Redundancy
c. Increase Data Consistency
d. Data Security
34. SQL data type to denote a character string value is:
a. Char
b. Varchar
c. Text
d. All of the above
35. Which one of the following is a set of one or more attribute taken collectively to uniquely identify a record?
a. Candidate key
b. Sub key
c. Super key
d. Foreign key
36. Libre office 
a. Database Management Application
b. Word Processing Application
c. Spreadsheet Application
d. Presentation Application
37. The COUNT can be used for
a. Count Specific values
b. Count based on condition
c. Both a and b
d. None of the above
38. An operator gives a range C30:L100. The cell that does not fill in this range is:
a. J31
b. L30
c. F99
d. N33
39. When you click on a spreadsheet, a rectangular box with thick outline becomes prominent. It is called:
a. Workbook
b. Active cell
c. Cell
d. Locked cell
40. What is the output of cell containing number 456.783, when a formatted to '###'
a. 456.783
b. 456.78
c. 4.56
d. 4.78
41. To return remainder after a number is divided by a divisor in Excel, which function is used?
a. DIV( )
b. ROUND( )
c. FACT( )
d. MOD( )
42. What PowerPoint feature will you used to apply motion effects to different objects of a slide?
a. Animation Scheme
b. Slide Transition
c. Animation Objects
d. Slide Design
43. If Ram transfers ownership of a Google Docs file to Shyam. Which of the following rights is still available to Ram?
a. Change visibility options of the file
b. Permanently deleted the file
c. Edit the file
d. Share file with others
44. An image editor which is which is similar to Adobe Photoshop is:
a. NVU
b. Open Office
c. Blue Fish
d. GIMP Shop
45. Which of the following tag is used to add rows in the table?
a. <td> and </td>
b. <tr> and </tr>
c. <th> and </th>
d. None of the above
46. What should be the first tag in an HTML document?
a. <head>
b. <title>
c. <html>
d. <document>
47. The arrangement of name list in sequential order is called
a. Formatting
b. Sorting
c. Ordering
d. Listing
48. The formula to add number in cell A3 with the number in cell A4 is
a. avg(A3:A4)
b. sum(A3:A4)
c. sum(A3::A4)
d. sum(A3;A4)
49. A spreadsheet cell that is highlighted with heavy border is
a. Active cell
b. Passive cell
c. Lock cell
d. Permanent cell
50. ___is not spreadsheet program.
a. Microsoft Excel
b. Numbers
c. Libre Office Cale
d. Libre Office Impress

Post a Comment

If you have any doubts. Please let me know

Previous Post Next Post
banner