Lumbini Province, Computer Operator 2080/01/30

 

प्रदेश लोक सेवा आयोग
लुम्बिनी, प्रदेश
स्थानीय सरकारी सेवा अन्तर्गत विविध सेवा, सहायक पाँचौ तह, कम्प्युटर अपरेटर पदको प्रतियोगितात्मक लिखित परिक्षा
मितिः २०८०/०१/३० गते

KEY: [A]                                      
समयः ४५ मिनेट                                   पूर्णाङ्कः १००
                           विषयः सेवा सम्बन्धी
                          
उत्तरपुस्तिकामा प्रश्नपत्रको KEY अनिवार्य रुपले उल्लेख गर्नुपर्नेछ । उल्लेख नगरेमा उत्तरपुस्तिका रद्द हुनेछ । परिक्षामा Mobile, Calculator आदिको प्रयोग गर्न पाइनेछैन ।

1. जिन्सी व्यवस्थापनको पहिलो प्रक्रिया तलका मध्ये कुन हो ?
a. खरिद योजना
b. माग संकलन
c. खरिद आदेश
d. दाखिला
2. सार्वजनिक सेवा प्रवाहलाई प्रभावकारी तुल्याउन स्थापना गरिएको हेलो सरकारको निशुल्क फोन नम्बर तलका मध्ये कुन हो ?
a. १००१
b. १००४
c. १०११
d. ११११
3. नेपालमा भित्र्याइएको पहिलो कम्प्युटर कुन हो ?
a. ICL 2950/10
b. IBM 1401
c. Facit
d. UNIVAC
4. चलानी रजिष्टरमा तलका मध्ये कुन कुरा खुलाउनु पर्दैन ?
a. पत्रको मिति
b. चलानी नं.
c. विषय
d. हस्ताक्षर गर्ने पदाधिकारीको नाम, थर
5. उत्प्रेरणाकाे दुई तत्व सिद्धान्त कसले प्रतिपादन गरेका हुन् ?
a. फ्रेडरिक हर्जवर्ग
b. अव्राहम मास्लो
c. म्याक ग्रेगर
d. जोन एडम्स
6. ___developed the basic Computer Architecture.
a. Charles Babbage
b. John Von Neumann
c. Blaise Pascal
d. Garden Moore
7. Which computer memory is used for storing program and data currently being processed by the CPU?
a. Mass Memory
b. Internal Memory
c. Non-Volatile Memory
d. PROM
8. Which of the following technology is used by hard disk drive?
a. Semiconductor
b. Laser beam
c. Magnetic disk
d. Magnetic tape
9. ___is formed when computers are networked with a switch in a LAN.
a. Bus topology
b. Ring topology
c. Star topology
d. Mesh topology
10. ___connector is used at ends of twisted pair cable to connect a NIC card and a port in a switch.
a. RJ 45
b. BNC
c. HDMI
d. USB
11. The program embedded on chip is called.
a. Live ware
b. Firmware
c. Shareware
d. Operating system
12. Which of the following term refers to the physical path over which a message travels in a computer network?
a. Path
b. Medium
c. Route
d. Protocol
13. Conversion of an octal number 20s to its binary number is:
a. 100002
b. 101112
c. 101102
d. 111102
14. FAT stands for:
a. File Accommodation Table
b. File Access Table
c. File Allocation Table
d. File Activity Table
15. Which command will be used to display a file within the specified directory of pathname?
a. Dir\pathname
b. Dir\pathname\pathname
c. Dir\ch
d. Dir\pathname\filename
16. Which of the following is a component of Microsoft window that enables to view and change system setting?
a. Windows control
b. Control panel
c. Windows setting
d. Windows panel
17. Windows control panel is used for:
a. Removing hardware and software
b. Controlling user accounts
c. Accessing network setting
d. All of the above
18. Which of the following is not of the merge process?
a. Sort the data source records
b. Merge the two files to print to create a new document
c. Edit a data source
d. Format a main document
19. Which of the following command can be used to access the font size tool on formatting toolbar?
a. Ctrl + S
b. Ctrl + Shift + S
c. Ctrl + P
d. Ctrl + Shift + P
20. Which of the following typically appear at the end of document for citation of source?
a. End note
b. Footnote
c. Header
d. Footer
21. Superscript, subscript, outline, emboss, engrave are known as:
a. Font style
b. Font effects
c. Word art
d. Text effects
22. Which of the following can be picked as reference type while inserting a cross-reference?
a. Bookmark
b. Footnote
c. End note
d. All of the above
23. Search a text to change and replace it with something other can be done by:
a. Ctrl + F
b. Ctrl + H
c. Ctrl + C
d. All of the above
24. Which of the following security technique helps to maintain integrity of a document?
a. File password
b. Digital signature
c. File encryption
d. All of the above
25. Header and footer are visible in:
a. Draft view
b. Normal view
c. Page layout view
d. Print layout view
26. What happens when dollar sign($) are entered in a cell address? (e$B$2:$B$10)
a. An absolute cell address is created
b. Cell address will change when it is copied to another cell
c. The sheet tab is changed
d. The status bar does not display the cell address
27. When a number does not display the cell address
a. ###
b. #DIV/01
c. #Name?
d. All of the above
28. The formula "=Counta(value1, value2___)counts the number of cells in a range that:
a. Are not empty
b. Contains numbers
c. Empty cells
d. Contain text
29. Identify the invalid method of editing the cell content:
a. Press the F12 key
b. Press the Alt key
c. Double click the cell
d. Click the formula bar
30. You can specify___to format a cell value as currency:
a. Currency symbol
b. Decimal places
c. Decimal places and currency symbol
d. Neither currency symbol nor decimal places
31. What is the universal file format for importing and exporting in Excel?
a. XML
b. CSV
c. SPSS
d. Text
32. Generating series of numbers/specific sequential number codes can be done manually by:
a. Selecting two numbers that are in the right sequences
b. Dragging the file handle to the end of the number range
c. Use the ROW function together with the TEXT function
d. All of the above
33. Which of the following ways filter data from Pivot table?
a. Inserting slicer
b. Using auto filter
c. Using report filter
d. All of the above
34. Which of the following search of table for a particular value and then find the associated value in the same rows, but different columns?
a. VLOOKUP
b. CONCATENATE
c. SUMIFS
d. All of the above
35. A composite key is:
a. The primary key with auto number as the field type
b. Is a foreign key that uniquely identifies records
c. Made up of two or more fields to uniquely identify records
d. None of the above
36. Which of the following command is used to delete an existing row in a table?
a. Erase
b. Drop
c. Delete
d. Remove
37. Using the keyword__will return records in which the field value equals a defined text.
a. Like
b. Between
c. Is Null
d. Equal
38. ___is used to represent relationship between tables.
a. Primary key
b. Secondary key
c. Foreign key
d. Tertiary key
39. Which is the relationship between database tables represented the case where are many people involved in each project and every person can involve more than one project?
a. One to one relationship
b. One to many or many to one relationship
c. Many to many relationship
d. None of the above
40. A____in access in a database object that you can use to create a user interface for a database application.
a. Form
b. Report
c. Macro
d. All of the above
41. Which of the following section does not exist in a slide layout?
a. Animation
b. Chart
c. List
d. Title
42. ___allows to create a new presentation by selecting ready-made font and graphics effect?
a. Design template
b. Master slide
c. Animation scheme
d. Presentation template
43. HTML is what type of language?
a. Scripting language
b. Markup language
c. Programming language
d. Network protocol
44. The tag is used to add images to HTML document is:
a. <HTML>
b. <HR>
c. <HI>
d. <IMG>
45. According to Electronic Transaction Act, who appoints controller?
a. Nepal government
b. Ministry of general administration
c. Office of company register
d. Department of information technology
46. Which of the following is not major objectives of ICT Policy, 2072?
a. To create ICT easily accessible and affordable to all
b. To develop new and upgrade the existing ICT infrastructure
c. To promote good governance using ICT
d. To develop and implement 5G network all over the country
47. Which of the following is/are the provincial power?
a. Operation of radio, FM, television
b. Housing and registration fee
c. Motor vehicle tax
d. All of the above
48. Provisions related to computer offences/crimes are mentioned in:
a. The constitution of Nepal
b. Local government operation act
c. IT policy
d. Electronic transaction act
49. The application of machine learning methods to a large database is called:
a. Artificial intelligence
b. Data mining
c. Big data computing
d. Internet of things
50. Which of the following is/are applicable of Natural Language Processing(NPL)?
a. Speech recognition
b. Speech segmentation
c. Text to speech
d. All of the above



Post a Comment

If you have any doubts. Please let me know

Previous Post Next Post
banner