Nepal Transit and Warehousing Company Limited Technical, Level Five, Computer Assistant Position Open Competitive Written Examination Exam Date: 2081/09/22

Public Service Commission

Nepal Transit and Warehousing Company Limited Technical, Level Five, Computer Assistant Position Open Competitive Written Examination, 2081/09/22

1. The word ASCII stands for:

A) Applied Standard Code for Information Interchange 

B) American Standard Code for Information Interchange 

C) Association of Standard Code for Information Interchange 

D) Aggregated Standard Code for Information Interchange 

Answer: B) American Standard Code for Information Interchange Explanation: ASCII is a standard encoding system used for text representation in computers.

 

2. What does the term 'physical structure of the disk' refer to in file management?

A) The logical organization of files and folders 

B) The metadata stored about files 

C) The arrangement of sectors, tracks, and cylinders on the disks 

D) The naming conventions for files 

Answer: C) The arrangement of sectors, tracks, and cylinders on the disks Explanation: The physical structure defines how the data is physically laid out on the disk.

 

3. Which generation does Universal Automatic Computer (UNIVAC) belong to?

A) First 

B) Second 

C) Third 

D) Fourth 

Answer: A) First Explanation: UNIVAC was one of the first-generation computers, known for using vacuum tubes.

 

4. In a computer system, the motherboard is the:

A) Central circuit board that holds and connects all components 

B) Main processing unit 

C) Storage device 

D) Peripheral device 

Answer: A) Central circuit board that holds and connects all components Explanation: The motherboard is the main board that connects CPU, RAM, and other peripherals.

 

5. Which of the following is a procedural programming language?

A) C++ 

B) Java 

C) Prolog 

D) C 

Answer: D) C Explanation: C is a procedural programming language that follows a step-by-step approach to problem-solving.

 

6. What is the purpose of multimedia in computing?

A) To store large files efficiently 

B) To provide interactive and diverse forms of content 

C) To enhance CPU performance 

D) To ensure data security 

Answer: B) To provide interactive and diverse forms of content Explanation: Multimedia integrates text, audio, video, and images to deliver rich user experiences.

 

7. Which of the following is an extension of a video file?

A) JPEG 

B) DOCX 

C) AVI 

D) TXT 

Answer: C) AVI Explanation: AVI is a multimedia container format used for storing video and audio files.

 

8. The purpose of ALU is to:

A) Store data temporarily 

B) Perform calculations and logical operations 

C) Manage input and output operations 

D) Control the computer's clock speed 

Answer: B) Perform calculations and logical operations Explanation: The Arithmetic Logic Unit (ALU) is responsible for performing mathematical and logical computations.

 

9. What is the primary function of an operating system?

A) Manage hardware resources 

B) Compile programs 

C) Browse the internet 

D) Display graphical images 

Answer: A) Manage hardware resources Explanation: The operating system is the interface that manages hardware and software resources.

 

10. Which tool in Windows is used for checking and repairing disk errors?

A) Disk Cleanup B) Backup and Restore C) Disk Defragmenter D) Disk Scanning Answer: D) Disk Scanning Explanation: Disk Scanning checks for errors on the disk and attempts to repair them.

 

11. Where does a file go when you delete a file in your computer?

A) Recycle Bin 

B) Hard Disk 

C) Taskbar 

D) RAM 

Answer: A) Recycle Bin Explanation: When a file is deleted, it is moved to the Recycle Bin, allowing for recovery if needed.

 

12. Which of the following tasks allows restoring the system to an earlier state without affecting personal files?

A) Windows Update 

B) Windows Backup 

C) System Restore 

D) Disk Cleanup 

Answer: C) System Restore Explanation: System Restore rolls back system files and settings to a previous state without altering personal data.

 

13. The type of application used to create and format text documents is known as:

A) Electronic Sheet 

B) Word Processing 

C) Electronic Processing 

D) Clipart Answer: B) Word Processing Explanation: Word processors like MS Word are used for creating and editing text documents.

 

14. What is the blank space outside the printing area on a page?

A) Margins 

B) Header 

C) Footer 

D) Clipart 

Answer: A) Margins Explanation: Margins are the blank spaces surrounding the content on a page.

 

15. What is a gutter margin?

A) Margin added to the left margin when printing 

B) Margin added to the right margin when printing 

C) Margin added to the binding side of the page when printing 

D) Margin added to the outside of the page when printing 

Answer: C) Margin added to the binding side of the page when printing Explanation: Gutter margins provide extra space on the binding side to accommodate binding.

 

16. Which of the following is not essential to perform a mail merge operation?

A) Word Fields 

B) Main Document 

C) Data Source 

D) Merge Fields 

Answer: A) Word Fields Explanation: Mail merge requires a main document, data source, and merge fields but not word fields.

 

17. Which of the following is true?

A) Footer repeats the same information on every page 

B) Footnote repeats the same information on every page 

C) Both Footer and Footnote repeat the same information on every page 

D) Footer appears on only one page Answer: A) Footer repeats the same information on every page Explanation: A footer is consistent across all pages unless specified otherwise.

 

18. What is the function of 'Thesaurus' in Word Processing?

A) To suggest synonyms 

B) To suggest antonyms 

C) To suggest synonyms and antonyms 

D) To create a table of contents 

Answer: C) To suggest synonyms and antonyms Explanation: The Thesaurus tool helps find synonyms and antonyms for selected words.

 

19. How is a bulleted list in Microsoft Word created?

A) Go to the Insert tab and choose Bullets 

B) Right-click and select Insert Bullet 

C) Go to the Page Layout tab and choose Bullets 

D) Click on the Home tab and select the Bullets icon 

Answer: D) Click on the Home tab and select the Bullets icon Explanation: The Bullets icon is located in the Home tab for creating bulleted lists.

 

20. In Microsoft Word, what is the task of 'Format Painter'?

A) It copies formatting from one part of the document and applies it to another B) It paints a color over the selected text 

C) It changes the font style of the selected text 

D) It formats an entire paragraph Answer: A) It copies formatting from one part of the document and applies it to another Explanation: Format Painter is a tool used to replicate formatting styles.

 

21. What do letters represent in a spreadsheet?

A) Blocks 

B) Columns 

C) Cells 

D) Rows 

Answer: B) Columns Explanation: In spreadsheets, letters represent column headings, while numbers represent row headings.

 

22. How would you quickly find all cells in a worksheet that contain formulas?

A) Use Find Feature 

B) Filter by Color 

C) Go to Special 

D) Use Trace Precedents 

Answer: C) Go to Special Explanation: The "Go to Special" option in Excel allows you to find cells with specific properties, such as formulas.

 

23. How many cells will be selected if cells are selected as D3:F5?

A) 3 

B) 6 

C) 8 

D) 9 

Answer: D) 9 Explanation: The selection includes a 3x3 grid (3 rows × 3 columns), resulting in 9 cells.

 

24. Which feature would you use to capture and analyze data from multiple sheets into one sheet?

A) Pivot Table 

B) Graph 

C) Consolidate 

D) Range 

Answer: C) Consolidate Explanation: Consolidate combines data from multiple sheets into a summary sheet.

 

25. What is the preprogrammed formula in a spreadsheet called?

A) Cell 

B) Graph 

C) Data Form 

D) Function 

Answer: D) Function Explanation: Functions are predefined formulas in spreadsheets, like SUM or AVERAGE.

 

26. Which of the following represents absolute cell referencing in a spreadsheet?

A) $D$6 

B) D6 

C) D$6 

D) $D6 

Answer: A) $D$6 Explanation: Absolute referencing uses $ to lock both the column and row.

 

27. Which of the following features is used to get data from a cell located in a different sheet of a spreadsheet?

A) Addressing 

B) Referencing 

C) Accessing 

D) Updating

 Answer: B) Referencing Explanation: Referencing allows users to access data from other sheets using sheet names.

 

28. What does the =COUNTIF() function in Excel do?

A) Counts cells as specified 

B) Counts blank cells in a range 

C) Counts cells with numbers in a range 

D) Returns values based on a TRUE or FALSE condition 

Answer: A) Counts cells as specified Explanation: COUNTIF() counts the number of cells that meet a given condition.

 

29. Which of the following shortcut keys is used to insert a new blank slide below the current slide in PowerPoint?

A) Ctrl+L 

B) Ctrl+M 

C) Ctrl+N 

D) Ctrl+C 

Answer: B) Ctrl+M Explanation: Ctrl+M adds a new slide in PowerPoint presentations.

 

30. Which shortcut key is used to start a PowerPoint slide show from the beginning?

A) Ctrl+F5 

B) Shift+F5 

C) Alt+F5 

D) F5 

Answer: D) F5 Explanation: Pressing F5 starts the slideshow from the first slide.

 

31. Which is the best view for getting your thoughts for a presentation out on the computer?

A) Outline View 

B) Notes Page View 

C) Slide Sorter View

D) Slide View 

Answer: A) Outline View Explanation: Outline View helps organize the structure and content of a presentation.

 

32. What is the main use of an index in a database system?

A) To delete data 

B) To access data quickly

 C) To bookmark data 

D) To update data 

Answer: B) To access data quickly Explanation: Indexes improve database query performance by allowing quick data retrieval.

 

33. The process of organizing data into tables and establishing relationships between them is known as:

A) Data Mining 

B) Data Modeling 

C) Data Warehousing 

D) Database Design 

Answer: D) Database Design Explanation: Database design structures data efficiently for relationships and queries.

 

34. Which of the following commands is used to create a new table in a database?

A) ALTER B) SELECT C) MODIFY D) CREATE Answer: D) CREATE Explanation: The CREATE command is used to create new database objects like tables.

 

35. Data integrity in a database application ensures that data is:

A) Accurate, consistent, and valid throughout its lifecycle 

B) Stored securely 

C) Backed up regularly 

D) Encrypted and protected 

Answer: A) Accurate, consistent, and valid throughout its lifecycle Explanation: Data integrity ensures correctness and reliability of data.

 

36. When a record in one table can relate to multiple records in another table, what type of relationship is it?

A) One-to-One 

B) Many-to-Many 

C) One-to-Many 

D) Many-to-One 

Answer: C) One-to-Many Explanation: A one-to-many relationship connects one record in Table A to multiple records in Table B.

 

37. Which of the following HTML tags is used to display a picture in a webpage?

A) <picture> 

B) <img> 

C) <image> 

D) <src> 

Answer: B) Explanation: <img> is the HTML tag used for embedding images.

 

38. Which attribute is used to add video controls like play, pause, and volume in a video?

A) Autoplay 

B) Play 

C) Controls 

D) Video 

Answer: C) Controls Explanation: The "controls" attribute enables video playback options like play/pause.

 

39. What does the term HTTP stand for?

A) Hyper Terminal Tracing Program 

B) Hypertext Tracing Protocol 

C) Hypertext Transfer Protocol 

D) Hypertext Transfer Program 

Answer: C) Hypertext Transfer Protocol Explanation: HTTP is the foundation of data communication on the web.

 

40. What is a Zero-Day vulnerability?

A) A known vulnerability with a patch 

B) A vulnerability exploited before a patch is available 

C) A vulnerability found in an old system 

D) An encrypted system flaw 

Answer: B) A vulnerability exploited before a patch is available Explanation: Zero-day vulnerabilities are exploited before developers can issue fixes.

 

41. For what purpose is the "TRACERT" command used in a computer network?

A) To trace the path between two systems on a network 

B) To check if the specified server is available in the network 

C) To modify the IP address and subnet mask 

D) To display the current TCP/IP connections in the network 

Answer: A) To trace the path between two systems on a network Explanation: TRACERT (or traceroute) is a command-line tool that shows the route packets take to reach a destination.

 

42. What is the function of a DNS server in a computer network?

A) To translate domain names into IP addresses 

B) To assign addresses to devices 

C) To secure the network from external threats 

D) To monitor network traffic Answer: A) To translate domain names into IP addresses Explanation: A DNS server resolves human-readable domain names (like www.rameshprasadkoirala.com.np) into machine-readable IP addresses.

 

43. Which of the following network utilities is used to test the reachability of an Internet Protocol network?

A) IPCONFIG 

B) PING 

C) TRACERT 

D) NETSTAT 

Answer: B) PING Explanation: PING sends packets to a network destination to check if it's reachable.

 

44. Which of the following is a security threat?

A) Distributed System 

B) Application 

C) Distributed Denial of Service (DDoS) 

D) Social Gathering 

Answer: C) Distributed Denial of Service (DDoS) Explanation: A DDoS attack overwhelms a server with excessive requests, causing disruption.

 

45. What is a Zero-Day vulnerability?

A) A known vulnerability with a patch 

B) A vulnerability exploited before a patch is available 

C) A vulnerability found in an old system D) An encrypted system flaw 

Answer: B) A vulnerability exploited before a patch is available Explanation: A zero-day vulnerability is exploited before it is patched by developers.

 

46. Which of the following malware types does not clone or replicate itself through infection?

A) Viruses 

B) Worms 

C) Trojans 

D) Rootkits 

Answer: C) Trojans Explanation: Trojans disguise themselves as legitimate software but do not replicate or spread on their own.

 

47. When did the Government of Nepal release the latest National ICT Policy?

A) 2061 BS 

B) 2062 BS 

C) 2071 BS 

D) 2072 BS 

Answer: D) 2072 BS Explanation: The National ICT Policy of Nepal was last updated in 2072 BS.

 

48. Under the Electronic Transactions Act, 2063, who is responsible for ensuring the authentication of electronic records and signatures?

A) The Controller of Certifying Authority B) Nepal Rastra Bank 

C) The Ministry of Home Affairs 

D) The Supreme Court 

Answer: A) The Controller of Certifying Authority Explanation: This authority ensures the legality and security of electronic records and signatures in Nepal.

 

49. How much share does the Government of Nepal (Finance Ministry) have in Nepal Transit and Warehousing Co. Ltd?

A) 25% 

B) 30% 

C) 50% 

D) 100% 

Answer: D) 100% Explanation: Nepal Transit and Warehousing Co. Ltd is fully owned by the Government of Nepal.

 

50. Which of the following HTML tags is used to display a picture in a webpage?

A) <picture> 

B) <img> 

C) <image> 

D) <src> 

Answer: B) Explanation: The <img> tag is the standard HTML tag used to embed images in web pages.

Post a Comment (0)
Previous Post Next Post

ADS 1

ADS 2