Computer Operator Post
2081-01-08
Part-A: Objective Questions
1. Which command divides the surface of the blank disk into sectors and assign a unique address to each one.
A. Ver
B. Format
C. Fat
D. Chkdsk
2. Shortcut key for
creating a new folder is
A. F2
B. Ctrl+C
C. Alt+Ctrl
D. Ctrl+Shift+N
3. Which tool in control
panel is used to adjust your computer setting to control computer with voice
command?
A. System and security
B. Appearance and
personalization
C. Hardware and sound
D. Ease of access
4. …………..tag is used to
create a numbered list in HTML.
A. <ol>
B. <ul>
C. <li>
D. <II>
5. The element holds two
or more frame elements.
A. Frameset
B. Frame
C. Frmbody
D. Frmelement
6. Which of the
following input device interprets pencil marks on paper media?
A. Punch card reader
B. Optical scanner
C. Hand writing defector
D. O.M.R. (optical mark
reader)
7. The term GIGO is
related to which characteristics of computers?
A. Speed
B. Automatic
C. Accuracy
D. Reliability
8. Dot matrix printer is
an example of
A. Impact printer
B. Non-Impact printer
C. Thermal printer
D. Laser printer
9. is a translator which
translates the program written in high level language into machine level
language.
A. Assembler
B. Compiler
C. Machine level
language
D. Software
10. The cache memory
works between
A. ROM and CPU
B. RAM and ROM
C. CPU and RAM
D. Random and secondary
memory
11. Which of the
following is valid statement?
A. Data in itself is
useless unless it is processed
B. The data that is
processed is called a program
C. The data which is not
yet processed is information
D. Information is processed
by computer to generate data
12. The delay that occur
during the playback of a stream is called;
A. Stream delay
B. Playback delay
C. Jitter
D. Event delay
13. Which of the
following cables can trans data at high speed?
A. UTP cable
B. Coaxial cable
C. Optic fiber cable
D. Twisted pair cable
14. Which of the
following is considered as the unsolicited commercial email?
A. Virus
B. Malware
C. Spam
D. All of the above
15. Firewalls are to
protect against
A. Virus attacks
B. Phishing attacks
C. Data driven attacks
D. Unauthorized attacks
16. The purpose of the
macros feature in won processing application is
A. To insert hyperlink
B: To record and
automate task
C. To create header and
footer
D. To apply predefined
styles to text
17. The space left
between the margin and the start of a paragraph is called;
A. Spacing
B. Gutter
C. Indentation
D. Alignment
18. In which view,
headers and footers are visible?
A. Normal view
B. Page layout view
C. Print layout view
D. Draft view
19. The ability to
combine name and addresses with a standard document is called;
A. Form letters
B. Document formatting
C. mail merge
D. Data management
20. Which of the
following tab is used to add the document citation?
A. Home
B. Insert
C. Page layout
D. References
21. Which of the
following shortcut key is used to check spelling?
A. F9
B. F1
C. F2
D. F7
22. A4 sized paper is
A. 21.59 cm x 27.94 cm
B. 21.59 cm x 35.56 cm
C. 21 x 29.7 cm
D. 14.8 cm x 21 cm
23. In excel, Cells are
labeled as
А. І,ІІ,ІІІ
B. 1,2,3
C. A1,B1,C1
D. A,B,C
24. The basic unit of
worksheet into which you enter data is called a
A. Tab
B. Cell
C. Box
D. Range
25. Which of the
following is NOT the correct method of editing the cell content?
A. Press the Alt key
B. Press the F2 key
C. Click the formula bar
D. Double click the cell
26. The formula in the
cell B5 is =A4+C3. This is copied to cell D8. What will be the formula in D8?
A. =C7+E6
B. =C4+E3
C. =E7+C5
D. =A4+C3
27. Which tab contains
the tool "Freeze panes"?
A. Home
B. View
C. Page layout
D. Review
28 . Absolute reference
of third row of E column in excel is;
A. E3
B. $E3
C. $E$3
D. None of the above
29. Which of the
following feature displays only the data in column(s) according to specified
criteria?
A. Pivot
B. Sorting
C. Filtering
D. Formula
30. The PowerPoint view
that displays only text (title and bullet) is
A. Outline view
B. Notes page view
C. Slide sorter
D. Slide show
31. A is an area
reserved for a specific piece of data.
A. Report
B. Key
C. Record
D. Field
32. A field that
uniquely identifies each record in a table is
A. Index key
B. Main field
C. Primary key
D. Key field
33. Which is NOT a valid
data type in MS access?
A. Memo
B Picture
C. Currency
D. Auto number
34. Record of the table
is also called;
A. Field
B. Text
C. Field
D. Tuple
35. Runs on a computer
hardware and serve as platform for other
software to run
on.
A. System software
B. Operating system
C. Application software
D. All of the above
Part-B: Subjective
Questions
1. What are the common
computer security threats and protection measures?
= Common
Computer Security Threats and Protection Measures:
- Threats:
- Malware (viruses, worms, Trojans)
- Phishing attacks
- DDoS attacks
- Insider threats
- Ransomware
- Zero-day exploits
Protection Measures:
- Use of antivirus and antimalware
software
- Firewalls
- Regular software updates and patches
- Strong authentication mechanisms
(password policies, multi-factor authentication)
- Employee training and awareness programs
- Encryption of sensitive data
- Backup and disaster recovery plans
2. Explain the
importance of relationships in a relational database system. Describe the types
of relationships commonly used in database design, and provide examples of how
they are implemented in Ms-Access.
=Importance of
Relationships in a Relational Database System:
- Relationships in a relational database
system are crucial for organizing and managing data efficiently. They ensure
data integrity, reduce redundancy, and enable complex queries.
Types of Relationships:
- One-to-One: Each record in one table is
related to only one record in another table.
- One-to-Many: One record in a table can
be related to multiple records in another table.
- Many-to-Many: Multiple records in one
table are related to multiple records in another table.
Examples of Implementation in MS-Access:
- One-to-One: Employee to Employee Details
(Employee ID links to Employee Details ID)
- One-to-Many: Customer to Orders (One
customer can have multiple orders)
- Many-to-Many: Students to Courses (Many
students can enroll in multiple courses, and each course can have multiple
students)
3. What is an operating
system? List down its major functions.
=
Operating System:
An operating system is software
that manages computer hardware and provides services for computer programs.
Its major functions include:
1. Process Management: Handling running
programs, scheduling tasks, and managing resources.
2. Memory Management:
Allocating memory to processes, swapping data between memory and disk.
3. File System Management:
Organizing and managing files and directories on storage devices.
4. Device Management:
Managing input/output devices such as keyboards, monitors, printers, etc.
5. User Interface:
Providing a user-friendly interface for interacting with the computer.
6. Security:
Enforcing access control policies, protecting resources from unauthorized
access.
7. Networking:
Facilitating communication between devices in a network.
8. Error Detection and
Handling: Detecting and responding to errors and failures in hardware or
software components.