Assistant Computer Operator
2080.02.08
Part-A: Objective
Questions 35
x 1=35 Marks
1. Which statement is
FALSE regarding the recycle bin?
A. You can find deleted
files in recycle bin.
B. You can restore any files in recycle bin if you ever need.
C. You can increase free space of disk by sending files in recycle bin.
D. You can right click and choose empty recycle bin to clean it at once
2. In DOS, which command
is used to clear the screen and display the prompt?
A. Clear
B. Erase
C. Cls
D. Flush
3. Which windows feature
lists the applications running on your computer?
A. Disk Defragment
B. Disk Monitor
C. Program and Feature
D. Task Manager
4. Indentation in computer
word processing is used to
A. make the text
readable
B. change the paragraph
color
C. apply border around text
D. change line spacing
5. Which of the following
is not necessary to perform a mail-merge operation?
A. main document
B. word fields
C. data source
D. merge fields
6. Which of the following
is printed at the bottom of each page?
A. Footer
B. Footmark
C. Foot set
D. Bottom section
7. To assign a name to a
specific location in a document we use ..........
A. Go To
B. Page Setup
C. Bookmark
D. Macro
8. Portrait and Landscape
are
A. Page Sizes
B. Page Orientations
C. Page Layouts
D. Page Setups
9. Word wrap
feature........
A. sets text inside the
fixed margin
B. appears at the bottom
of the document
C. marks the paragraph center
D. applies border around text
10. Which key is used to
check for spelling and grammar?
A. F3
B. F5
C. F7
D. F9
11. What is the cell
address for a cell in 4th row and 3rd column?
A. C4
B. 4C
C. 3D
D. D3
12. The process of
arranging the items of a column in some sequence or order
is known as
A. Sorting
B. Filtering
C. Pivoting
D. Forecasting
13............is getting
data from a cell in a different sheet.
A. Referencing
B. Functioning
C. Updating
D. Accessing
14. Which of the following
represents absolute cell reference?
A. B3
B. $B$3
C. B$3
D. SB3
15. Which of the following
is not a logical operator?
A. =>
B. <=
C. =
D. +
16. Which chart would be
better to track the progress of the stock market on a daily basis?
A. Pie Chart
B. Row Chart
C. Line Chart
D. Column Chart
17. In electronic
spreadsheet. SUM, AVERAGE, MIN and MAX are examples of
A. functions
B. calculations
C. formulas
D. expressions
18. To highlight only
cells in a range having a greater than or less specific value, we can use
A. Data validation
B. Conditional formatting
C. What-if analysis
D. Consolidate
19.Which of the following
is not the data type in MS-Access?
A. Number
B. Date
C. Text
D. Identifier
20. Which of the command
can be used to modify a column in a table?
A. alter
B. update
C. set
D. create
21. In MS-Access, you can
use a.........to answer a simple question, to perform calculations, to combine data from the
different tables, or even to add, change, or delete table data.
A. Query
B. Forms
C. Pivot Chart
D. Report
22. A search value in SQL
query can be a specific value or it can be...
A. Comparison operator
B. Logical operator
C. Relationship
D. Wild card character
23. You want to create a
new presentation by selecting ready-made font color and graphics. What do you use?
A. Base Template
B. Master Slide Theme
C. Design Template
D. Master Template
24. Which powerpoint view
displays each slide of the presentation as a thumbnail and is useful for rearranging slides?
A. Slide Master
B. Slide Show
C. Slider Sorter
D. Notes Page
25. On which of the
following, the animation is applied?
A. Slides
B. Objects
C. Views
D. Designs
26. Boot sequence is
changed from.....
A. Setting
B. Control Panel
C. Taskbar
D. BIOS
27. Text is captured by
scanner with
A. Keyboard
B. Mouse
C. Input hardware
D. Optical character recognition
28. What is the address
given to a computer connected to a network called?
A. Network Address
B. Routing Address
C. IP Address
D. DNS Address
29............is a
collection of data, programs, procedures, routines and instructions that tell a computer or electronic device how to
run, work and execute specific tasks.
A. Hardware
B. Network
C. Software
D. System
30. Which of the following
is a valid encoding format?
A. UTF-1
B. UTF-A
C. UTF-8
D. UTF-10
31. Which of the following
is a light sensitive device that converts drawing, printed text or other images into digital form?
A. Keyboard
B. Plotter
C. Scanner
D. OMR
32.................... is
a type of software that is embedded directly into a piece of hardware.
A. Firmware
B. Cache
C. Operating System
D. Middleware
33. ................. is
the ratio of the horizontal length to the vertical length in Monitor.
A. Aspect Ratio
B. Contrast
C. Resolution
D. Interlacing
34. What does a
collection of hyperlinked documents on the internet form?
A. World Wide Web (www)
B. E-mail System
C. Hypertext Markup Language (HTML)
D. Intranet
35.................. a is
a network security device that monitors and filters incoming and outgoing network traffic based on an
organization's previously established security policies.
A. Switch
B. Router
C. Firewall
D. Server
Part-B: Subjective Questions 3 x 5=15 Marks
1. Briefly explain
common security threats in computer systems.
Common
security threats in computer systems:
a) Malware: Malware refers to malicious software designed to gain unauthorized access, cause damage, or collect sensitive information. It includes viruses, worms, trojans, ransomware, and spyware.
b) Phishing: Phishing is a technique used to trick users into revealing sensitive information, such as passwords or credit card details, by posing as a trustworthy entity via email, instant messaging, or websites.
c) Denial of Service (DoS) Attacks: DoS attacks aim to overwhelm a system or network with a flood of illegitimate requests, rendering it inaccessible to legitimate users.
d) Man-in-the-Middle (MitM) Attacks: In a MitM attack, an attacker intercepts and potentially alters communication between two parties without their knowledge, allowing them to eavesdrop or manipulate data.
e) Social Engineering: Social engineering involves manipulating individuals into revealing confidential information or performing actions that compromise security.
f) Password Attacks: These involve various methods, such as brute-force attacks or dictionary attacks, to crack passwords and gain unauthorized access to systems or accounts.
g)
Data Breaches: Data breaches involve unauthorized access to sensitive
information, often due to poor security practices, vulnerabilities, or insider
threats.
2. What is an
operating system? Explain in detail the functions of an operating system.
An operating system (OS) is a software that manages computer hardware and provides an interface between the user and the underlying hardware. It performs various functions to ensure efficient utilization of system resources and to provide a convenient and secure environment for users. Here are the key functions of an operating system:
a) Process Management: The OS manages and controls processes, which are executing instances of programs. It schedules processes, allocates resources, and provides mechanisms for process communication and synchronization.
b) Memory Management: The OS allocates and tracks system memory to processes, ensuring efficient memory utilization. It handles memory allocation, deallocation, and swapping processes in and out of memory when needed.
c) File System Management: The OS provides a hierarchical structure for organizing and storing files on secondary storage devices. It manages file operations, such as creation, deletion, reading, and writing, and ensures data integrity and security.
d) Device Management: The OS interacts with and manages various hardware devices, such as input/output devices, storage devices, and network interfaces. It provides drivers and handles device operations, including device allocation, scheduling, and error handling.
e) User Interface: The OS provides a
user interface through which users interact with the computer system. This can
be a command-line interface, graphical user interface (GUI), or a combination
of both, allowing users to run programs, manage files, and configure system
settings.
f) Security and Protection: The OS
enforces security measures to protect the system and user data. It controls
access to resources, implements user authentication and authorization, and
ensures data privacy and integrity. It also detects and handles security threats,
such as malware or unauthorized access attempts.
g) Network Management: In networked environments, the OS enables communication between computers and manages network connections, protocols, and configurations. It facilitates network resource sharing and supports distributed computing and file sharing.
Overall, an operating system acts as a bridge between the user and the computer hardware, providing an environment for executing programs, managing resources, and ensuring system stability, security, and usability.
3. Briefly explain
about any five built-in functions in MS-Excel.
Five built-in functions in MS-Excel:
a) SUM: The SUM function allows you to calculate the sum of a range of cells. For example, "=SUM(A1:A5)" would add the values in cells A1 through A5 and provide the total.
b) AVERAGE: The AVERAGE function calculates the average value of a range of cells. For instance, "=AVERAGE(A1:A5)" would give you the average of the values in cells A1 through A5.
c) VLOOKUP: The VLOOKUP function allows you to search for a value in the leftmost column of a table and retrieve a corresponding value from a specified column. It is commonly used for data lookup and referencing. For example, "=VLOOKUP(A2, B1:D10, 3, FALSE)" would search for the value in cell A2 within the range B1 to D10 and return the corresponding value from the third column.
d) COUNT: The COUNT function counts the number of cells within a specified range that contain numeric values. It can be useful for counting the occurrence of specific data points or determining the number of filled cells in a range. For instance, "=COUNT(A1:A10)" would count the number of cells in the range A1 to A10 that contain numbers.
e) IF: The IF function allows you to perform conditional evaluations. It evaluates a given condition and returns different values based on whether the condition is true or false. This function is handy for creating logical tests and performing different actions based on the results. For example, "=IF(A1>10, "Yes", "No")" would check if the value in cell A1 is greater than 10 and return "Yes" if true, or "No" if false.
-Good Luck-