State Public Service Commission,
Karnali State
Miscellaneous Services, Assistant Level 4th Level, Open Competitive Written Examination for the post of Ass. Computer Operator
Date 2079-02-15
Group-A
1. <title>.......</title> is included
inside.
A. <body> </body>
B.<head> </head>
C<div> </div>
D. None of the above
2. The tag used to add images to HTML document is
A. <FONT>
B. <HR>
C. <H>
D. <IMG>
3. Which function in excel helps rotate (switch)
the values from rows to columns and
vice versa?
A. INVERSE
B. FLIP
C. REVERSE
D. TRANSPOSE
4. Which feature is used for monitoring all
document changes?
A. Edit Document
B. Monitor Change
C. Track Change
D. Track all
5. Which of the following is not a correct method
of editing the cell content?
A. Press the Alt key
B. Press the F2 Key
C. Click the formula bar
D. Double click the cell
6.Updates the data in a Pivot table when the
source data change.
A. Format report
B. Pivot table
C. Refresh data
D. Show data
7. Getting data from a cell located in a different
sheet is called
A. Accessing
B. Referencing
C. Filtering
D. Customizing
8. In goal seek, 'by changing cell' refers to the
cell
A. Containing the out come formula
B. Containing the constraint
C. That you are attempting to calculate
D. Containing the target value
9. Which chart would be better to track the
progress of stock market on a daily
basis?
A. Pie
B. Line
C. Bar
D. Scatter
10. The operating system keeps the information of
files in a table called
A. File Folder Table (FFT)
B. File Index Table (FIT)
C. File Allocation Table (FAT)
D. Directory Index Table (DIT)
11. Which statement is FALSE?
A. You can find deleted files in recycle bin
B. You can restore any file in recycle in you need
C. You can increase free space of disk by
sending files in recycle bin
D. You can right click and choose empty recycle bin to clean
it at once
12. Which of the following is NOT a System Tool?
A. Disk Management
B. Disk Defragmenter
C. Backup
D. Virus Scanning
13. Which Command can be used to create or change
name of volume of Disk?
A. NAME
B. LABLE
C. VOLUME
D. FAT
14. Microsoft Access is a
A. RDBMS
B. OODBMS
C. ORDBMS
D. Network Database Model
15. Which of the lowing database objects asks a
question of information in a
database and then displays the result?
A. Tables
B. Reports
C. Queries
D. Forms
16. Which of the key to represent relationship
between tables?
A. primary key
B. secondary key
C. foreign key
D. tertiary key
17. Which of the following causes retrieval of any
kind of data from a database?
A. Key
B. Query
C. Indexing
D. Relationship
18. To insert a new slide in the Current
Presentation, we can Choose
A. CTRL+M
B. CTRL + N
C. CTRL+B
D. CTRL+P
19. What does ASCII stand for?
A. American Standard Code for Information
Interchange
B. American Scientific Code for Information Interchange
C. American Scientific Code for Interchanging Information
D. American Standard Code for Interchanging Information
20. BIOS stands for
A. Base Interface Operating System
B. Basic Input Output System
C. Base Interaction for Output System
D. Basic Interface to Operating System
21. The unit that processes logical and
arithmetical operations
A. ALU
B. Control Unit
C. Memory Unit
D. Cache Unit
22. The act of ploiting human weaknesses to
gain access to personal information and
protected systems is known as
A. Trojan Monuver
B. DDOS exectuin
C. Social Engineering
D. Worm Infiltration
23. Which of the following ine protocal chat
provides email facility?
A. SMTP
B. FTP
C. TELNET
D. SNMP
24. As compared to the secondary memory, the primary
memory of a computer is
A. slow
B. fast
B. cheap
D. large
25. Hexadecimal numbers are a mixture of ......
A. Letters and decimal numbes
B. Binary and octal number
C. Octal and Decimal number
D. Binary and decimal numbers
26. You suspect a virus has entered your computer.
What will not be affected by the
virus?
A. CMOS
B. Boot sector
C. Floppy disks
D. Program files
27. Which of the following is related to
preventing unauthorized
access to information?
A. ICT Policy
B. Privacy ACT
C.Electronic Transaction Act
D. National Communication Policy
28. A computer program with a graphical user
interface for displaying and
navigating between web pages is called
A. Navigator
B. File explorer
C. Web Browers
D. Word Processor
29. A function inside another Function is called
A. Nested function
B. Round Function
C. Sum function
D. Text function
30. The ghost text that appears behind the text is
known as
A. Air Mark
B. Shade mark
C. Water mark
D. Shadow mark
31. How to insert the Page Break in word?
A. Enter
B. ALT+Enter
C. CTRL+ Enter
D. SHIFT+Enter
32. In Ms-Word, frequently used tasks can be
automated using
A. Mail merge
B. Macro
C. Thesaurus
D. Spell checker
33. Which of the following feature in Ms-Word can
help you locate misspelled
words and correct them as you type?
A. Spell checker
B. Auto Corret.
C. Find and Replace
D. None of the above
34. Indentation is used to
A. Make text readable
B. Change the paragraph color
C. Apply border around text
D. Charge line spacing
35. Gutter margin is
A. Added to the left of margin when printing
B. Added to the right margin when printing
C. Added to the binding side of page when
printing
D. Added to the outside of the page when printing
Group-B
1. Define hardware.
Differentiate between device driver and firmware.
Computer hardware refers to the
computer's tangible components or delivery systems that store and run the
written instructions provided by the software. Computer hardware includes the physical parts of a computer,
such as the case, central processing unit, random access memory, monitor,
mouse, keyboard, computer data storage, graphics card, sound card, speakers and
motherboard.
Device Drivers |
Firmware |
Device driver is a
particular type of software program that enables the operating system to
communicate with and control devices. Device drivers are pretty much
device-specific meaning they are written and distributed by the manufacturer
of a particular device. |
Firmware, on the other
hand, is a special form of software that enables a device to perform
functions without the need of installing additional software. Firmware is
program code stored in a hardware device, typically in non-volatile memory
such as read-only memory or flash memory. |
Device drivers are
operating system-specific and hardware dependent that enable operating system
and other software programs to access hardware functions without worrying
about the details on how the hardware devices work. Without a device driver,
the OS won’t be able to communicate with a hardware device. |
Firmware, on the other
hand, is software permanently etched into a hardware device that enables the
device to perform functions like basic input/output tasks, without the need
of installing additional software. It carries out the integral functions of
hardware devices. |
The purpose of a device
driver is to ensure smooth functioning of hardware device for which it is
intended to work and to also allow it to be used with different operating
systems. For example, a graphics driver enables the OS to communicate with
and control your graphics card or video card or on-board graphics. |
Firmware, on the other
hand, is a software program that gives life to the hardware device,
programming it to give instructions in order to communicate with other
devices and perform functions like basic input/output tasks. |
Device
drivers enable operating system and other software programs to access
hardware functions without worrying about the details on how the hardware
devices actually work. |
Firmware is also
software, in the context that it is program code. The difference lies in how
the program code is stored. Firmware includes the internal set of
instructions used by a hardware device for initiation and operation, often
encoded in non-volatile memory. |
2. What is an electronic
spreadsheet? Explain how Ms-Excel spreadsheet is organized.
An electronic spreadsheet is a grid
which interactively manages and organises data in rows and columns. It allows
to link the cells from various worksheets to summarize data from information.
Multiple sheets help to keep the information organized.several sources. In this manner, we can create formulas using a combination
of local and linked.
Excel
is a spreadsheet program from Microsoft and a component of its
Office product group for business applications. Microsoft Excel enables users to format, organize
and calculate data in a spreadsheet.In Ms-Excel ,the columns in a
worksheet are labeled with letters ascending alphabetically from left to right.
The rows are numbered in ascending order from top to bottom. Each cell has a
location within the worksheet represented by a letter and a number. These cell
references are used by the formulae and functions in the worksheet.
3. What is an operating
system? Differentiate between internal and external commands of DOS with
example.
An operating system (OS) is system software that manages computer hardware, software
resources, and provides common services for computer programs. An
operating system (OS) is the program that, after being initially loaded into
the computer by a boot program, manages all of the other application programs
in a computer
Internal DOS
Command |
External DOS
Command |
|
1. |
These commands are contained in files of
MS-DOS. |
These commands are not in-built in MS-DOS. |
2. |
Functions of internal DOS commands are built
into the command interpreter |
Functions which are not included in the
interpreter |
3. |
Requires any external file in the computer
to read internal DOS command. |
Requires an internal file in the computer to
read external DOS commands. |
4. |
An internal command is embedded into the command.com file |
an external command is not and requires a separate file to
operate. |
Best of Luck
The only distinction is that you are playing in} it from the convenience of your home home}. For those who want to enjoy the really feel of an actual 카지노사이트 casino from their residence, they need to} go for live casino video games. It will provide you with|provides you with} the same excitement that you get when you stroll into an offline casino.
ReplyDelete