Province Public Service Commission
Gandaki
Province
Computer Operator (Province) 2078/11/14
The key of the question paper must be mentioned in the answer sheet. Failure to do so will result in cancellation of the answer sheet. Also, electronic devices like Calculator and Mobile will not be used in the exam.
1. The feature in word processor that enables to send same letter by addressing different persons:
A. Template
B. Mail Merge
C. Hyperlink
D. Macros
2. Gutter margin is:
A. Margin that is added
to left margin when printing
B. Margin that is added
to right margin when printing
C. Margin that is
added to the binding side of page
D. Margin that is added
to the outside of the page when printing
3. A computer operator
needs to search all files whose file name starts with 'H' and ends in 'X'. It has an extension of docx. The correct
search text is:
A. H*X.docx
B. *H*X.docx
C. *H*X.*
D.H.X. docx
4. The command used by an
user to create a new directory is:
A. mkdir
B. dir
C. chdir
D. chkdsk
5. Which of the operating
system is not open source?
A. Linux Operating
system
B. Apple macOs
C-Free BSD operating
system
D. All of the above
6........is the process to
copy data from one location and store in another location as an alternative incase the original data is lost.
A. Restore
B. Backup
C. Format
D. Delete
7. Which type of software
is operating system?
A. Communication
software
B. Application software
C. System software
D. Word processing
software
8. Which software prevents
the external access to a system?
A. Firewall
B. Gateway
C. Router
D. Virus checker
9.......refers to any type
of application or presentation that involves more than one type of media, such as text, graphics, video, animation
and sound.
A. An executable
file
B. Desktop
publishing
C. Multimedia
D. Hypertext
10. Which of the following
languages enables storing, retrieving and manipulating data in databases?
A. Java
B. CSS
C-SQL
D. Hypertext
11. The topology which
requires a central controller or hub is called as:
A. Mesh Topology
B. Star Topology
C. Bus Topology
D. Ring Topology
12) Which of them is not a
Network Topology?
A. Star
B. Mesh
C. Ring
D.Peer to Peer
13. The ASCII value of
Letter 'A' is:
A. 97
B. 67
C. 65
D. 95
14. As per the Electronic
Transaction Act 2008, the digital signature and certificate may be revoked for:
A. Death of the
subscriber
B. Upon proving that
requirements were not fulfilled completely
C. If false information
were provided during issuance
D. All of the
above
15. Which of the following
is the high speed memory used in computer?
A. RAM
B. Hard disk
C. Cache memory
D. BIOS
16. Pasting a website
content to MS-Word to reflect the style of word document's cursor can be achieved by:
A. Ctrl+V
B. Ctrl+Alt+V
C.Ctrl+Shift+V
D. Alt+Shift+V
17. A computer operator is
writing in Preeti Font. Same characters do change while being typed. The correct location to customize the
setting to disable the auto changing is:
A. Symbols
B. Macros
C. Spelling and Grammar
D. Auto Correct
18. Example of computer
font is:
A. Bold
B. Italic
C. Arial
D. 40pt
19. The page default size
is letter. It needs to be change to A4. It can be done by setting:
A. Page Layout
B. Ruler
C. Format Painter
D. Section Break
20. Choose the
applications which provide the facilities of word processing:
A. Microsoft Word
B. Open Office Writer
C. WordPad
D. All of the above
21. When designing an HTML
page, the title bar text can be changed by using:
A.
<head>...</head>
B. <body>
<title>...</title> </body>
C. <head>
<title>... </title> </head>
D. <body>
<hl>....</h1> </body>
22. The binary equivalent
of decimal number 89,625 is
A. (101 100 1.101)2
B. (1100111.110)2
C. (1111.01100)2
D. None of the above
23. Where is computer virus
usually hidden?
A. Operating
System
B. Application Program
C. Disk Driver
D. Both A & B
24. If you combine B5, B6,
C5 and C6 cells, you will get a big cell. What address will be
A. B5C5
B. B5
C. C5
D. B5C5B6C6
25. To run a presentation
from the slide where the slide was previously stopped
at, the shortcut key
is:
A. Shift+F5
B. F5
C. Ctrl+Shift+F5
D. Alt+Shift+F5
26. ...........is a
pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary
keys and foreign keys:
A. Schema diagram
B. Relational
algebra
C. Database diagram
D. Schema flow
27. How do you generate
"Table of Contents" in word file?
A. Go to References
and select Table of Contents
B. Go to References and
select Update Table
C. Go to Insert and
select Table of Contents
D. Go to Insert and
select Update Table
28. Which of the following
is related to the services provided by cloud?
A. Sourcing
B.Ownership.
C. Reliability
D. Paas
29. Which of the following
is not an open-source software?
A. Libre Office
B. Microsoft Office
C. Open Office
D. VLC media player
30. FOSS is the:
A. Open-source
software
B. Free and
open-source software
C. Proprietary software/
D. Public Domain
Software
31. Which cloud computing
feature allows the service to change in size or volume to meet user needs?
A. Security
B. Scalability
C. Cost Saving
D. Virtualization
32. Which of the
following support presentation application?
A. Google slides
B. Microsoft
PowerPoint
C. Libre Office Impress
D. All of the above
33. Which of the following
is not the advantage of database?
A. Increase Data
Dependency
B. Reduce Data
Redundancy
C. Increase Data
Consistency
D. Data Security
34. SQL data type to
denote a character string value is:
A. Char
B. Varchar
C. Text
D. All of the above
35. Which one of the
following is a set of one or more attributes taken collectively to uniquely identify a record?
A. Candidate key
B. Sub key
C. Super key
D. Foreign key
36. Libre Office Base is a
A. Database Management
Application
B. Word Processing
Application
C. Spreadsheet
Application
D. Presentation
Application
37. The COUNTII can be
used her
A. Coum specific values
B: Count based on a
condition
C. Both A & B.
D. None of the above
38. An operator gives a
range C30:L100. The cell that does not fill in this range is:
A. J31
B. L30
C. F99
D. N33
39. When you click on a
spreadsheet, a rectangular box with thick outlines becomes prominent. It is called:
A. Workbook
B. Active cell
C. Cell
D. Locked cell
40. What is the output of
cell containing number 456.783, when formatted to "###
A.456.783
B. 456.78
C. 4.56
D. 4.78
41. To return remainder
after a number is divided by a divisor in Excel, which function is used?
A. DIV ()
B.ROUND()
C. FACT()
D. MOD ()
42. What PowerPoint
feature will you use to apply motion effects to different objects of a slide?
A. Animation Scheme
B. Slide Transition
C. Animation Objects
D. Slide Design
43. If Ram transfers
ownership of a Google Docs file to Shyam. Which of the
following rights is still
available to Ram?
A. Change visibility
options of the file
B. Permanently delete the
file
C. Edit the file
D. Share file with
others
44. An image editor which
is similar to Adobe Photoshop is:
A. NVU
B. Open Office
C. Blue Fish
D. GIMP shop
45, Which of the following
tag is used to add rows in the table?
A. <td> and
</td>
B. <tr> and
</tr>
C. <th> and
</th>
D. None of the above
46. What should be the
first tag in any HTML document?
A. <head>
B. <title>
C. <html>
D. <document>
47. The arrangement of
name list in sequential order is called:
A. Formatting
B. Sorting
C. Ordering
D. Listing
48. The formula to add
number in cell A3 with the number in cell A4 is:
A. avg(A3:A4)
B. sum(A3:44)
C. sum(A3:A4)
D. sum(A3A4)
49. A spreadsheet cell
that is highlighted with heavy border is:
A. Active Cell
B. Passive Cell
C. Lock Cell
D. Permanent Cell
50. .......is not
spreadsheet program.
A. Microsoft Excel
B. Numbers
C. Libre Office Cale
D. Libre Office Impress
The End
thank you so much
ReplyDelete