Public Service Commission
Citizen Investment Fund, Technician,
Technician, 4th, Open Competitive Written Examination
for the post of Assistant Computer Operator 2080/06/03
1. Which of the followings is not a programming language?
A) HTML
B) Python
C) PHP
D) Fortran
2. Access time is......
A) Seek time + Latency time
B) Seek time
C) Seek time Latency time
D) Latency time
3. Which of the following is the smallest
unit of data in a computer?
A) Byte
B) Bit
C) KB
D) Nibble
4. Java is............level programming
language.
A) Machine
B) Low
C) High
D) None of the above
5. Cache memory is part of......
A) Random Access Memory
B) Read Only Memory
C) Central Processing Unit
D) Hard Disk
6. What is the main purpose of an internet
browser?
A) To create and manage website
B) To provide internet connectivity to device
C) To search and index websites for search
engine
D) To access and display web pages and
content on the internet
7. What is the primary function of the
CPU in a computer?
A) Displaying graphics on the monitor
B) Storing data for long-term use
C) Managing network connections
D) Performing calculations and executing
instructions
8. Integrated circuits (ICs) made of
silicon chips were introduced in which generation of computers, significantly reducing their size and improving
performance?
A) First
B) Second
C) Third
D) Fourth
9. ..... is one of protocol used
for email communication.
A) HTTP
B) POP
C) ICMP
D) UDP
10. In which of the following types of
memory we don't write Firmware?
A) ROM
B) EPROM
C) RAM
D) Flash Memory
11. Which wild card character indicates a
single character in the search pattern?
A)
B)?
C) []
D) &
12. Which is not the function of
Operating System?
A) Process management
B) Memory management
C) Job scheduling
D) Data backup and recovery
13. In DOS.... command is used to display
the contents of a text file.
A) TYPE
B) TEXT
C) DIS
D) SHOW
14. What is the extension of font file?
A).TTF
B).MDB
C).FFT
D).TXT
15. The process of swapping data between
RAM and a storage device to free up memory
is known as .....
A) Defragmentation
B) Paging
C) Virtualization
D) Overclocking
16. LaTeX is a specialized word processor
commonly used in which field? and Technical Writing
A) Business
B)Academics
C) Personal Use
D) Graphic Design
17. What feature in Microsoft Word
automatically corrects common spelling mistakes as you type?
A) Thesaurus
B) AutoFormat
C) AutoSummarize
D) AutoCorrect
18. Function key used for spell check in
Microsoft Word is .....
A) F2
B) F5
C) F6
D) F7
19. Which of the following is one of the
file extension for word processor file?
A) odf
B) odp
C) owp
D) odt
20. Which is not the word processor
application?
A) Microsoft Word
B) Notepad
C) Word Star
D) Google Docs
21. Which is valid option of line spacing
in MS Word program?
A) At least
B) Exactly
C) Multiple
D) All of the above
22. The explanatory notes or references
placed at the end of the document is called ...........
A) Footnote
B) Endnote
C) Bottom Note
D) None of the above
23 . What is the keyboard shortcut to undo the
last action in Microsoft Word?
A) Ctrl+C
B) Ctrl+Z
C) Ctrl+V
D) Ctrl+X
24. Which option in the Page Setup dialog
box allows you to set the margins in Microsoft
Word?
A) Size
B) Orientation
C) Layout
D) Margins
25. How can you create a bulleted list in
Microsoft Word?
A) Press the Tab key
B) Press the Enter key
C) Use the Bullets button in the Home tab
D) Use the Numbering button in the Home
tab
26. What is the extension of a Microsoft
Excel file?
A).docx
B).xlsx
C).pptx
D).pdf
27. What does the "Wrap Text"
option in Excel do?
A) It applies a text wrap-around effect
to cell contents
B) It forces text to fit within the width
of the cell by automatically adjusting the font size
C) It aligns cell contents to the right side of
the cell
D) It automatically adjusts the height of the
cell to fit the text
28 . What does the function AVERAGE() do in
Microsoft Excel?
A) Adds up a range of values
B) Finds the smallest value in a range
C) Calculates the average of a range
D) Checks a condition and returns a value
29. Which of the following is the correct
syntax for referring cell B6 of Sheet1 for Sheet2?
A) Sheet1@B6
B) Sheet1#B6
C) Sheet1$B6
D) Sheet1!B6
30. In Microsoft Excel, a single data
point in a cell is referred to as .....
A) Worksheet
B) Workbook
C) Cell
D) Range
31. In Excel a collection of cells is
referred to as......
A) Worksheet
B) Workbook
C) Cell
D)Range
32. Which is the shortcut key to
recalculate the excel formula?
A) F2
B) F7
C) F9
D) F10
33. "Countif" function in MS Excel
counts the number of.....
A) cells in a range that contain numbers
B) cells in a range that are not empty
C)cells within a range that meet the
given condition
D) empty cells in a specified range of
cells
34. The shortcut key of insert table in
MS Excel is......
A) Ctrl+T
B) Alt+T
C) Ctrl+Alt+T
D) Ctrl+Shift+T
35. Suppose you have an excel sheet
having more than 1000 records with duplicate values. How can you remove the duplicate values?
A) Go to Formula menu and click on remove
duplicates
B) Go to Review menu and click on remove
duplicates
C) Go to Data menu and click on remove
duplicates
D) Go to Home menu, click conditional
formatting and click on remove duplicates
36. Which is invalid relationship type in
MS Access database?
A) One to one
B) One to two
C) One to many
D) Many to many
37. An organized collection of logically
related data is known as ......
A) Data
B) Meta Data
C) Database
D) Information
38. Which data type is invalid in MS
Access?
A) Hyperlink
B) OLE object
C) Yes/No
D) Varchar2
39. In Microsoft Access, what is a
database object that stores data in rows and
columns?
A) Query
B) Table
C) Form
D) Report
40. In MS Access if you select AutoNumber
data type for a field then new values for this
field could be generated in..... manner.
A) incremental
B) decrementa
C) random
D) incremental or random
41. Each record is constituted by a
number of individual data items which are called.....
A) Fields
B) Data types
C) Relations
D) Tables
42. When you want all your slides to
contain same fonts and images (e.g. logos) by making
changes in one place, then you should use ......
A) Slide Template
B) Slide Formatter
C) Slide Designer
D) Slide Master
43. Which of the following sections does
not exist in a slide layout?
A) Titles
B) Lists
C) Charts
D) Animation
44. Which view in Microsoft PowerPoint
allows you to rearrange slides and apply slide transitions?
A) Slide Show view
B) Normal view
C) Slide Sorter view
D) Reading view
45. How can you preview animations on a
slide in PowerPoint?
A) Click on the Preview button in the
Animations tab to see a live preview of animations
B) Press the Ctrl+P shortcut keys to
preview animations
C) Right click on the slide and select Preview
Animations
D) None of the above
46. As per ETA, 2063, which of the following
is not a function of Controller?
A) To issue a license to the Certifying
Authority
B) To issue a digital certificate to customers
C) To exercise the supervision and
monitoring over the activities of Certifying Authority
D) To fix the standards to be maintained by certifying
authority in respect to the verification
of digital signature
47. Which of the following is the goal of ICT Policy, 2072?
A) Nepal will be at least in the top
second quartile of the International Network Readiness Index and e-government
ranking by 2020
B) At least of 75% of the population will have
digital literacy by the end of 2020
C) 90% of the population will be able to access the broadband
services by 2020
D) All of the above
48. नागरिक लगानी कोषको सञ्चालक पदमा नियुक्ति हुन कम्तीमा कति उमेर हुनुपर्ने हुन्छ ?
A) २१ वर्ष
B) २५ वर्ष
C) ३० वर्ष
D) ३५ वर्ष
49. In which year, Department of Information Technology was
established by Government of Nepal?
A) 2065 BS
B) 2069 BS
C) 2072 BS
D) 2075 BS
50. नागरिक लगानी कोष ऐन, २०४७ बमोजिम गठन हुने सञ्चालक समितिमा कति जना सदस्य रहने व्यवस्था छ?
A) ५ जना
B) ६ जना
C) ७ जना
D) ८ जना
Subjective Section "B"
1 Define mail merge in MS Word
application. Write steps to prepare letter for mail merge.
= Mail merge is a feature in Microsoft Word that allows
you to create personalized documents, such as letters, envelopes, or labels, by
merging a template document with a data source, such as an Excel spreadsheet or
a database. The result is a set of documents where each document contains
unique information from the data source. Here are the steps to prepare a letter
for mail merge:
a. Start Word Document: Open Microsoft Word
and create a new document or open an existing one that you want to use as the
template for your letter.
b. Select Mailings Tab: Go to the
"Mailings" tab in the Word ribbon.
c. Select Start Mail Merge: Click on the
"Start Mail Merge" button and choose the type of document you want to
create (e.g., Letters).
d. Select Recipients: Click on the
"Select Recipients" button to choose your data source. You can use an
existing list or create a new one in Word.
e. Insert Merge Fields: Place the cursor
where you want to insert personalized information (e.g., recipient's name), and
click on "Insert Merge Field" to select the fields from your data
source.
f. Preview Results: Click on "Preview
Results" to see how each merged document will look.
g. Complete the Merge: Click on "Finish
& Merge" and choose the option that suits your needs (e.g., "Edit
Individual Documents" to create a new document with merged data).
h. Merge Output: Word will generate the
merged documents with personalized information from your data source.
2 What is cell in spreadsheet? Explain about
Relative Cell and Absolute Cell Reference in MS Excel.
= A cell in a spreadsheet, such as Microsoft
Excel, is the basic unit of data storage. It is the intersection of a row and a
column and can contain various types of data, including numbers, text,
formulas, or functions.
- Relative Cell Reference: When you use a
relative cell reference in a formula (e.g., A1), the reference adjusts
automatically when you copy the formula to another cell. For example, if you
copy a formula from cell B1 to B2, the reference changes from A1 to A2 because
it's relative to the position of the formula.
- Absolute Cell Reference: An absolute cell
reference is indicated by adding a "$" symbol before the column letter
and/or row number (e.g., $A$1 or A$1 or $A1). When you use an absolute
reference in a formula, the reference remains fixed even if you copy the
formula to other cells. It won't change when you copy it.
3. What are the advantages of DBMS over
traditional file system in data management Explain.
=
Advantages of DBMS over Traditional File System:
Database Management Systems (DBMS) offer
several advantages over traditional file systems in data management:
a. Data Integrity: DBMS ensures data
integrity by enforcing data constraints and providing mechanisms for data
validation.
b. Data Security: DBMS offers user
authentication and access control to protect data from unauthorized access.
c. Data Consistency: DBMS maintains data
consistency through transactions, ensuring that data remains accurate even in
the presence of concurrent operations.
d. Data Redundancy Reduction: DBMS minimizes
data redundancy by storing data in a centralized repository, reducing the
chances of inconsistent data.
e. Data Retrieval Efficiency: DBMS uses
indexing and optimized query processing to retrieve data efficiently, improving
performance.
4. What is the difference between slide
animation and slide transition in MS PowerPoint? Write the process to insert
picture into PowerPoint Presentation. remedies.2+3=5
= Slide Animation: Slide animation refers to the movement
or effects applied to individual objects (e.g., text, images) on a slide. For
example, you can make text appear one word at a time or have an image fade in
gradually. To apply slide animations, select an object, go to the
"Animations" tab, and choose an animation effect.
- Slide Transition: Slide transition, on the
other hand, controls how one slide transitions to the next slide in a
presentation. It determines the visual effect between slides. To add slide
transitions, go to the "Transitions" tab and select a transition
effect.
Insert Picture into PowerPoint Presentation:
To insert a picture into a PowerPoint
presentation:
a. Click on the slide where you want to
insert the picture.
b. Go to the "Insert" tab.
c. Click on "Picture" to open the
file dialog and select the image you want to insert.
d. Adjust the size and position of the
picture on the slide as needed.
5. What is computer security threats? Explain
its types. What are the effective and protection measures to safeguard against
them? 2+5+3=10
= Computer
security threats are risks and potential dangers to the confidentiality,
integrity, and availability of computer systems and data. Types of computer
security threats include:
- Malware: Malicious software like viruses,
worms, Trojans, and ransomware that can infect and harm systems.
- Phishing: Deceptive emails or websites
used to trick users into revealing sensitive information.
- Hacking: Unauthorized access to computer
systems or networks to steal data or disrupt operations.
- Distributed Denial of Service (DDoS):
Overwhelming a network or website with traffic to make it unavailable.
- Data Breaches: Unauthorized access or
theft of sensitive data.
Protection Measures: To safeguard against
these threats, use antivirus software, employ strong passwords, keep software
updated, use firewalls, educate users about phishing, and regularly back up
data.
6. Explore the relationship between application
software, system software and the operating system. Define the Disk Operating
System (DOS). Explain the types of DOS commands with their examples. 5+2+3=10
= Application Software: These are programs designed for
specific tasks or functions, such as word processors, spreadsheets, and web
browsers. They rely on the operating system and system software to function.
- System Software: System software includes
the operating system and utility programs that manage computer hardware and
provide services to application software. Examples include device drivers,
system utilities, and the OS itself.
- Operating System (OS): The OS is the core
software that manages computer hardware, provides a user interface, and
controls the execution of application software. It acts as an intermediary
between hardware and software.
Disk Operating System (DOS): DOS is an older
type of operating system that uses a command-line interface for user
interaction. It was widely used on personal computers in the past.
Types of DOS Commands:
- Internal Commands: These are commands
built into the DOS shell. Examples include DIR (list files), CD (change
directory), and COPY (copy files).
- External Commands: These are standalone
executable files that extend the functionality of DOS. For example, FORMAT (to
format disks) and CHKDSK (to check and repair disk drives).
7. सूचना तथा सञ्चार नीति, २०७२ अनुसार नेपाल सरकारले सूचना सञ्चारको क्षेत्रमा विकास गर्नको लागि कस्तो परिदृश्य (Mission) राखेको छ ? यस नीतिका प्रमुख उद्देश्यहरू संक्षिप्तमा वर्णन गर्नुहोस् ।