Public Service Commission
Nepal Transit and Warehousing Company Limited Technical,
Level Five, Computer Assistant Position Open Competitive Written
Examination, 2081/09/22
1. The word ASCII stands for:
A) Applied Standard Code for Information
Interchange
B) American Standard Code for Information
Interchange
C) Association of Standard Code for Information
Interchange
D) Aggregated Standard Code for Information
Interchange
Answer: B) American Standard Code
for Information Interchange Explanation: ASCII is a
standard encoding system used for text representation in computers.
2. What does the term 'physical
structure of the disk' refer to in file management?
A) The logical organization of files and folders
B) The metadata stored about files
C) The arrangement of sectors, tracks, and cylinders on
the disks
D) The naming conventions for files
Answer: C) The arrangement of
sectors, tracks, and cylinders on the disks Explanation: The
physical structure defines how the data is physically laid out on the disk.
3. Which generation does Universal
Automatic Computer (UNIVAC) belong to?
A) First
B) Second
C) Third
D) Fourth
Answer: A) First Explanation: UNIVAC
was one of the first-generation computers, known for using vacuum tubes.
4. In a computer system, the
motherboard is the:
A) Central circuit board that holds and connects all
components
B) Main processing unit
C) Storage device
D) Peripheral device
Answer: A) Central circuit board
that holds and connects all components Explanation: The
motherboard is the main board that connects CPU, RAM, and other peripherals.
5. Which of the following is a
procedural programming language?
A) C++
B) Java
C) Prolog
D) C
Answer: D) C Explanation: C
is a procedural programming language that follows a step-by-step approach to
problem-solving.
6. What is the purpose of multimedia
in computing?
A) To store large files efficiently
B) To provide interactive and diverse forms of
content
C) To enhance CPU performance
D) To ensure data security
Answer: B) To provide interactive
and diverse forms of content Explanation: Multimedia
integrates text, audio, video, and images to deliver rich user experiences.
7. Which of the following is an
extension of a video file?
A) JPEG
B) DOCX
C) AVI
D) TXT
Answer: C) AVI Explanation: AVI
is a multimedia container format used for storing video and audio files.
8. The purpose of ALU is to:
A) Store data temporarily
B) Perform calculations and logical operations
C) Manage input and output operations
D) Control the computer's clock speed
Answer: B) Perform calculations and
logical operations Explanation: The Arithmetic Logic Unit
(ALU) is responsible for performing mathematical and logical computations.
9. What is the primary function of
an operating system?
A) Manage hardware resources
B) Compile programs
C) Browse the internet
D) Display graphical images
Answer: A) Manage hardware
resources Explanation: The operating system is the
interface that manages hardware and software resources.
10. Which tool in Windows is used
for checking and repairing disk errors?
A) Disk Cleanup B) Backup and
Restore C) Disk Defragmenter D) Disk
Scanning Answer: D) Disk Scanning Explanation: Disk
Scanning checks for errors on the disk and attempts to repair them.
11. Where does a file go when you
delete a file in your computer?
A) Recycle Bin
B) Hard Disk
C) Taskbar
D) RAM
Answer: A) Recycle Bin Explanation: When
a file is deleted, it is moved to the Recycle Bin, allowing for recovery if
needed.
12. Which of the following tasks
allows restoring the system to an earlier state without affecting personal
files?
A) Windows Update
B) Windows Backup
C) System Restore
D) Disk Cleanup
Answer: C) System Restore Explanation: System
Restore rolls back system files and settings to a previous state without
altering personal data.
13. The type of application used to
create and format text documents is known as:
A) Electronic Sheet
B) Word Processing
C) Electronic Processing
D) Clipart Answer: B) Word Processing Explanation: Word
processors like MS Word are used for creating and editing text documents.
14. What is the blank space outside
the printing area on a page?
A) Margins
B) Header
C) Footer
D) Clipart
Answer: A) Margins Explanation: Margins
are the blank spaces surrounding the content on a page.
15. What is a gutter margin?
A) Margin added to the left margin when printing
B) Margin added to the right margin when printing
C) Margin added to the binding side of the page when
printing
D) Margin added to the outside of the page when
printing
Answer: C) Margin added to the
binding side of the page when printing Explanation: Gutter
margins provide extra space on the binding side to accommodate binding.
16. Which of the following is not
essential to perform a mail merge operation?
A) Word Fields
B) Main Document
C) Data Source
D) Merge Fields
Answer: A) Word Fields Explanation: Mail
merge requires a main document, data source, and merge fields but not word
fields.
17. Which of the following is true?
A) Footer repeats the same information on every
page
B) Footnote repeats the same information on every
page
C) Both Footer and Footnote repeat the same information
on every page
D) Footer appears on only one page Answer: A)
Footer repeats the same information on every page Explanation: A
footer is consistent across all pages unless specified otherwise.
18. What is the function of
'Thesaurus' in Word Processing?
A) To suggest synonyms
B) To suggest antonyms
C) To suggest synonyms and antonyms
D) To create a table of contents
Answer: C) To suggest synonyms and
antonyms Explanation: The Thesaurus tool helps find
synonyms and antonyms for selected words.
19. How is a bulleted list in
Microsoft Word created?
A) Go to the Insert tab and choose Bullets
B) Right-click and select Insert Bullet
C) Go to the Page Layout tab and choose Bullets
D) Click on the Home tab and select the Bullets
icon
Answer: D) Click on the Home tab
and select the Bullets icon Explanation: The Bullets icon
is located in the Home tab for creating bulleted lists.
20. In Microsoft Word, what is the
task of 'Format Painter'?
A) It copies formatting from one part of the document and
applies it to another B) It paints a color over the selected
text
C) It changes the font style of the selected text
D) It formats an entire paragraph Answer: A)
It copies formatting from one part of the document and applies it to another Explanation: Format
Painter is a tool used to replicate formatting styles.
21. What do letters represent in a
spreadsheet?
A) Blocks
B) Columns
C) Cells
D) Rows
Answer: B) Columns Explanation: In
spreadsheets, letters represent column headings, while numbers represent row
headings.
22. How would you quickly find all
cells in a worksheet that contain formulas?
A) Use Find Feature
B) Filter by Color
C) Go to Special
D) Use Trace Precedents
Answer: C) Go to Special Explanation: The
"Go to Special" option in Excel allows you to find cells with
specific properties, such as formulas.
23. How many cells will be selected
if cells are selected as D3:F5?
A) 3
B) 6
C) 8
D) 9
Answer: D) 9 Explanation: The
selection includes a 3x3 grid (3 rows × 3 columns), resulting in 9 cells.
24. Which feature would you use to
capture and analyze data from multiple sheets into one sheet?
A) Pivot Table
B) Graph
C) Consolidate
D) Range
Answer: C) Consolidate Explanation: Consolidate
combines data from multiple sheets into a summary sheet.
25. What is the preprogrammed
formula in a spreadsheet called?
A) Cell
B) Graph
C) Data Form
D) Function
Answer: D) Function Explanation: Functions
are predefined formulas in spreadsheets, like SUM or AVERAGE.
26. Which of the following
represents absolute cell referencing in a spreadsheet?
A) $D$6
B) D6
C) D$6
D) $D6
Answer: A) $D$6 Explanation: Absolute
referencing uses $ to lock both the column and row.
27. Which of the following features
is used to get data from a cell located in a different sheet of a spreadsheet?
A) Addressing
B) Referencing
C) Accessing
D) Updating
Answer: B)
Referencing Explanation: Referencing allows users to
access data from other sheets using sheet names.
28. What does the =COUNTIF()
function in Excel do?
A) Counts cells as specified
B) Counts blank cells in a range
C) Counts cells with numbers in a range
D) Returns values based on a TRUE or FALSE
condition
Answer: A) Counts cells as
specified Explanation: COUNTIF() counts the number of
cells that meet a given condition.
29. Which of the following shortcut
keys is used to insert a new blank slide below the current slide in PowerPoint?
A) Ctrl+L
B) Ctrl+M
C) Ctrl+N
D) Ctrl+C
Answer: B) Ctrl+M Explanation: Ctrl+M
adds a new slide in PowerPoint presentations.
30. Which shortcut key is used to
start a PowerPoint slide show from the beginning?
A) Ctrl+F5
B) Shift+F5
C) Alt+F5
D) F5
Answer: D) F5 Explanation: Pressing
F5 starts the slideshow from the first slide.
31. Which is the best view for
getting your thoughts for a presentation out on the computer?
A) Outline View
B) Notes Page View
C) Slide Sorter View
D) Slide View
Answer: A) Outline View Explanation: Outline
View helps organize the structure and content of a presentation.
32. What is the main use of an index
in a database system?
A) To delete data
B) To access data quickly
C) To bookmark
data
D) To update data
Answer: B) To access data quickly Explanation: Indexes
improve database query performance by allowing quick data retrieval.
33. The process of organizing data
into tables and establishing relationships between them is known as:
A) Data Mining
B) Data Modeling
C) Data Warehousing
D) Database Design
Answer: D) Database Design Explanation: Database
design structures data efficiently for relationships and queries.
34. Which of the following commands
is used to create a new table in a database?
A) ALTER B) SELECT C) MODIFY D) CREATE Answer: D)
CREATE Explanation: The CREATE command is used to create
new database objects like tables.
35. Data integrity in a database
application ensures that data is:
A) Accurate, consistent, and valid throughout its
lifecycle
B) Stored securely
C) Backed up regularly
D) Encrypted and protected
Answer: A) Accurate, consistent,
and valid throughout its lifecycle Explanation: Data
integrity ensures correctness and reliability of data.
36. When a record in one table can
relate to multiple records in another table, what type of relationship is it?
A) One-to-One
B) Many-to-Many
C) One-to-Many
D) Many-to-One
Answer: C) One-to-Many Explanation: A
one-to-many relationship connects one record in Table A to multiple records in
Table B.
37. Which of the following HTML tags
is used to display a picture in a webpage?
A) <picture>
B) <img>
C) <image>
D) <src>
Answer: B) Explanation: <img>
is the HTML tag used for embedding images.
38. Which attribute is used to add
video controls like play, pause, and volume in a video?
A) Autoplay
B) Play
C) Controls
D) Video
Answer: C) Controls Explanation: The
"controls" attribute enables video playback options like play/pause.
39. What does the term HTTP stand
for?
A) Hyper Terminal Tracing Program
B) Hypertext Tracing Protocol
C) Hypertext Transfer Protocol
D) Hypertext Transfer Program
Answer: C) Hypertext Transfer
Protocol Explanation: HTTP is the foundation of data
communication on the web.
40. What is a Zero-Day
vulnerability?
A) A known vulnerability with a patch
B) A vulnerability exploited before a patch is
available
C) A vulnerability found in an old system
D) An encrypted system flaw
Answer: B) A vulnerability
exploited before a patch is available Explanation: Zero-day
vulnerabilities are exploited before developers can issue fixes.
41. For what purpose is the
"TRACERT" command used in a computer network?
A) To trace the path between two systems on a
network
B) To check if the specified server is available in the
network
C) To modify the IP address and subnet mask
D) To display the current TCP/IP connections in the
network
Answer: A) To trace the path
between two systems on a network Explanation: TRACERT (or
traceroute) is a command-line tool that shows the route packets take to reach a
destination.
42. What is the function of a DNS
server in a computer network?
A) To translate domain names into IP addresses
B) To assign addresses to devices
C) To secure the network from external threats
D) To monitor network traffic Answer: A)
To translate domain names into IP addresses Explanation: A
DNS server resolves human-readable domain names
(like www.rameshprasadkoirala.com.np) into machine-readable IP addresses.
43. Which of the following network
utilities is used to test the reachability of an Internet Protocol network?
A) IPCONFIG
B) PING
C) TRACERT
D) NETSTAT
Answer: B) PING Explanation: PING
sends packets to a network destination to check if it's reachable.
44. Which of the following is a
security threat?
A) Distributed System
B) Application
C) Distributed Denial of Service (DDoS)
D) Social Gathering
Answer: C) Distributed Denial of
Service (DDoS) Explanation: A DDoS attack overwhelms a
server with excessive requests, causing disruption.
45. What is a Zero-Day
vulnerability?
A) A known vulnerability with a patch
B) A vulnerability exploited before a patch is
available
C) A vulnerability found in an old system D) An
encrypted system flaw
Answer: B) A vulnerability
exploited before a patch is available Explanation: A
zero-day vulnerability is exploited before it is patched by developers.
46. Which of the following malware
types does not clone or replicate itself through infection?
A) Viruses
B) Worms
C) Trojans
D) Rootkits
Answer: C) Trojans Explanation: Trojans
disguise themselves as legitimate software but do not replicate or spread on
their own.
47. When did the Government of Nepal
release the latest National ICT Policy?
A) 2061 BS
B) 2062 BS
C) 2071 BS
D) 2072 BS
Answer: D) 2072 BS Explanation: The
National ICT Policy of Nepal was last updated in 2072 BS.
48. Under the Electronic
Transactions Act, 2063, who is responsible for ensuring the authentication of
electronic records and signatures?
A) The Controller of Certifying Authority B) Nepal
Rastra Bank
C) The Ministry of Home Affairs
D) The Supreme Court
Answer: A) The Controller of
Certifying Authority Explanation: This authority ensures
the legality and security of electronic records and signatures in Nepal.
49. How much share does the
Government of Nepal (Finance Ministry) have in Nepal Transit and Warehousing
Co. Ltd?
A) 25%
B) 30%
C) 50%
D) 100%
Answer: D) 100% Explanation: Nepal
Transit and Warehousing Co. Ltd is fully owned by the Government of Nepal.
50. Which of the following HTML tags
is used to display a picture in a webpage?
A) <picture>
B) <img>
C) <image>
D) <src>
Answer: B) Explanation: The <img> tag is the standard HTML tag used to embed images in web pages.