Karnali Province, Asst. Computer Operator 2079/02/15

 

State Public Service Commission
Karnali State
Miscellaneous Services, Assistant Level 4th Level, 
Open Competitive Written Examination for the Post of Asst. 
Computer Operator 2079/02/15

Group - A
1. <title>___</title> is included inside.
a. <body></body>
b. <head></head>
c. <div></div>
d. None of the above
2. The tag used to add images to HTML document is
a. <font>
b. <hr>
c. <h>
d. <img>
3. Which function in excel helps rotate(switch) the values from rows to columns and vice versa?
a. INVERSE
b. FLIP
c. REVERSE
d. TRANSPOSE
4. Which feature is used for monitoring all document change?
a. Edit document
b. Monitor change
c. Track change
d. Track all
5. Which of the following is not a correct method of editing the cell content?
a. Press the Alt key
b. Press the F2 key
c. Click the formula bar
d. Double click the cell
6. Updates the data in a Pivot table when the source data change?
a. Form report
b. Pivot table
c. Refresh data
d. Show data
7. Getting data from a cell located in a different sheet is called
a. Accessing
b. Referencing
c. Filtering
d. Customizing
8. In goal seek, 'by changing cell' refers to the cell
a. Containing the outcome formula
b. Containing the constraint
c. That you are attempting to calculate
d. Containing the target value
9. Which chart would be better to stack the progress of stock market on a daily basis?
a. Pie
b. Line
c. Bar
d. Scatter
10. The operating system keeps the information of files in a table is called
a. File Folder Fable(FFT)
b. File Index Table(FIT)
c. File Allocation Table(FAT)
d. Directory Index Table(DIT)
11. Which statement is False?
a. You can find deleted files in recycle bin
b. You can restore any file in recycle bin in you need
c. You can increase free space of disk by sending file in recycle bin
d. You can right click and choose empty recycle bin to clean it at once
12. Which of the following is not a System tool?
a. Disk management
b. Disk defragmenter
c. Backup
d. Virus scanning
13. Which command can be used to create or change name of volume of disk?
a. Name
b. Label
c. Volume
d. FAT
14. Microsoft Access is a
a. RDBMS
b. OODBMS
c. ORDBMS
d. Network Database Model
15. Which of the following database object asks a question of information in a database and then display the result?
a. Tables
b. Reports
c. Queries
d. Forms
16. Which of the key to represent relationship between tables?
a. Primary key
b. Secondary key
c. Foreign key
d. Tertiary key
17. Which of the following causes retrieval of any kind of data from a database?
a. Key
b. Query
c. Indexing
d. Relationship
18. To insert a new slide in the current presentation, we can choose
a. Ctrl + M
b. Ctrl + N
c. Ctrl + B
d. Ctrl + P
19. What does ASCII stands for?
a. American Standard Code for Information Interchange
b. American Scientific Code for Information Interchange
c. American Scientific Code for Interchanging Information
d. American Standard Code for Interchanging Information
20. BIOS stands for
a. Base Interface Operating System
b. Basic Input Output System
c. Base Interaction for Output System
d. Basic Interface to Operating System
21. That unit that processes logical and arithmetical operations
a. ALU
b. Control unit
c. Memory unit
d. Cache unit
22. The act of pointing human weakness to gain access to personal information and protected system is known as
a. Trojan Manuvir
b. DDOS Execution
c. Social Engineering
d. Worm Infiltration
23. Which of the following protocol chat provides email facility?
a. SMTP
b. FTP
c. TELNET
d. SNMP
24. As compared to the secondary memory, the primary memory of a computer is
a. Slow
b. Fast
c. Cheap
d. Large
25. Hexadecimal numbers are mixture of__
a. Letters and decimal numbers
b. Binary and octal number
c. Octal and decimal number
d. Binary and decimal number
26. You suspect a virus has entered your computer. What will be not be affected by the virus?
a. CMOS
b. Boot sector
c. Floppy disk
d. Program files
27. Which of the following is not related to preventing unauthorized access to information?
a. ICT Policy
b. Privacy ACT
c. Electronic Transaction Act
d. National Communication Policy
28. A computer program with a graphical user interface for displaying and navigating between web page is called
a. Navigator
b. File explorer
c. Web browsers
d. Word processors
29. A function inside another function is called
a. Nested function
b. Round function
c. Sum function
d. Text function
30. The ghost text appear behind the text is known as
a. Air mark
b. Shade mark
c. Water mark
d. Shadow mark
31. How to insert the page break in word?
a. Enter
b. Alt + Enter
c. Ctrl + Enter
d. Shift + Enter
32. In MS Word, frequently used tasks can be automated using
a. Mail merge
b. Macro 
c. Thesaurus
d. Spell checker
33. Which of the following feature in MS Word can help you locate misspelled words and correct them you type?
a. Spell checker
b. Auto correct
c. Find and replace
d. None of the above
34. Indentation is used to
a. Make text readable
b. Change the paragraph color
c. Apply border around text
d. Charge line spacing
35. Gutter margin is
a. Added to the left of margin when printing
b. Added to the right margin when printing
c. Added to the binding side of page when printing
d. Added to the outside of the page when printing

Group - B
1. Define hardware. Differentiate between device driver and firmware.
2. What is an Electronic Spreadsheet? Explain how MS Excel spreadsheet is organized.
3. What is an operating system? Differentiate between internal and external commands of DOS with example.


Post a Comment

If you have any doubts. Please let me know

Previous Post Next Post
banner