Nepal Rastra Bank, IT Assistant 2081/01/19

 

लोक सेवा आयोग
नेपाल राष्ट्र बैंक, प्राविधिक, सूचना प्रविधि, सहायक द्धितिय, सहायक (सूचना प्राविधि) पदको खुल्ला प्रतियोगितात्मक लिखित परिक्षा
२०८१/०१/१९ 

                                                                 KEY [D]
पत्रः प्रथम                      
समय: २ घण्टा ३० मिनेट                              à¤ªूर्णाङ्क: १००
         à¤µिषय: Information Technology-I
                                       
उत्तरपुस्तिकामा प्रश्नपत्रको KEY अनिवार्य रुपले उल्लेख गर्नुपर्नेछ । उल्लेख नगरेमा à¤‰à¤¤्तरपुस्तिका रद्ध हुनेछ । परीक्षामा calculator, mobile  प्रयोग गर्न पाइनेछैन् ।
                                Objective       Time: 30 mins
Multiple Choice                             25x1=25 Marks

1. Which network topology is best suited for large business, which must carefully control and coordinate the operation of distribution branch outlets?
a. Ring
b. Local area
c. Hierarchical
d. Star
2. Which of the following accurately describes the concept of subnetting in computer networking?
a. Subnetting refers to the process of connecting multiple networks together to form a larger network
b. Subnetting is a technique used to translate domain names into IP addresses
c. Subnetting involves encrypting data packets to secure them during transmission
d. Subnetting involves dividing a larger network into smaller sub network
3. Which of the following is a program that can retrieve files from the World Wide Web and render texts, images or sounds encoded in the files?
a. Explorer
b. Browser
c. Web Server
d. Web Application
4. What is the primary function of a firewall in network security?
a. Encrypting data transmission
b. Filtering network traffic based on predetermined security rules
c. Managing IP addresses
d. Controlling access to network resources
5. What technology is commonly used for teleconferencing?
a. VoIP
b. Bluetooth
c. NFC
d. RFID
6. What happens to a file if it is compressed?
a. Quality enhance
b. Requires less space for storage
c. Requires more time to deliver to client
d. Requires decryption to open
7. Which signal is used for execution and sequencing of instructions?
a. Logical signal
b. Input signal
c. Control signal
d. Output signal
8. What does the term 'peripheral device' refer to in the context of computer system?
a. The main processing unit of a computer
b. External devices connected to a computer to provide input and output capabilities
c. The operating system of a computer
d. A network of interconnected computers
9. Which of the following software programs or hardware device filters all data packets coming through the internet or a network?
a. Antivirus
b. Firewall
c. Cookies
d. Malware
10. What is the purpose of a modern in a computer system?
a. Provides digital security
b. Performs arithmetic operations
c. Stores data temporarily
d. Converts digital signals to analog signals
11. What is the purpose of BIOS settings in a computer system?
a. Managing storage device
b. Configuring system peripheral
c. Providing instructions for hardware initialization
d. Managing network connection
12. How many pins are available in parallel port?
a. 9
b. 15
c. 20
d. 25
13. What is the primary purpose of implementing a backup and disaster recovery plan?
a. To prevent all possible disasters from occurring
b. To minimize the impact of data loss and downtime in the event of a disaster
c. To ensure that no data loss occurs ever
d. To completely eliminate the need for data backup
14. IDE interface can be used to connect_____
a. Only hard drive
b. Only optical drive
c. Both hard drive and optical drive
d. None of the above
15. What is the primary difference between a vacuum tube and a semiconductor?
a. Vacuum tubes are similar in size
b. Semiconductors use electrons, while vacuum tubes use ions
c. Vacuum tubes are more efficient at high temperatures
d. Semiconductors consume less power
16. Which of the following transistor circuits is most commonly used?
a. Common Emitter
b. Common Base
c. Common Collector
d. Emitter Collector
17. In a PNP transistor, base will be of___ material.
a. F
b. N
c. Neither P nor N
d. Either P or N
18. How do MOSFETs differ from JFETs?
a. MOSFETs have higher input impedance
b. JFETs operate at higher temperate
c. MOSFETs are less susceptible to gate capacitance
d. JFETs have a larger channel width
19. Which of the following terms refers to the method of mapping the consecutive memory blocks to consecutive cache blocks?
a. Direct Mapping
b. Parallel Mapping
c. Associative Mapping
d. Indirect Mapping
20. Which ratio is used to measure the performance of cache memory?
a. Chat Ratio
b. Hit Ratio
c. Copy Ratio
d. Data Ratio
21. What is the name given to the method of accessing the I/O devices by repeatedly checking the status flags?
a. Interrupt based I/O
b. Memory Mapped I/O
c. Program-Controlled I/O
d. Hardwired I/O
22. What is the primary function of operating system?
a. Providing security to the system
b. Storing files and directories
c. Running application software
d. Managing hardware resources
23. What method offers higher speed of I/O transfer?
a. DMA
b. Memory mapped I/O
c. Program-controlled I/O
d. Interrupt-initiated I/O
24. A_____ is a named location on a disk where files are stored.
a. Folder
b. Volume
c. Label
d. Root
25. Which of the following is not a common security measure in operating system?
a. Antivirus Software
b. Firewall
c. Network Router
d. Intrusion Detection System

-The End-

Post a Comment

If you have any doubts. Please let me know

Previous Post Next Post
banner