Digital Nepal 69


1. A  firewall is installed at the point where the secure internal network and untrusted network meet which is also known as

A) chock point 

B) meeting point 

C) firewall point 

D) secure point 

2. In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are

A) added

B) removed

C) rearranged

D) Modified

3. Network connectivity is tested by following command

A) ipconfig

B) nslookup

C) dig

D) ping

4. Operating system does not perform

A) Managing I/O.

B) Translating programs

C) Running programs

D) Managing File System

5. Which one is system threat?

A) Port Scanning

B) Logic Bomb.

C) Trap Door

D) Trojan Horse

6. To access the services of operating system, the interface is provided by the

A) system calls

B) library

C) instructions

D) all of above

7. Which desktop environment is not used in any linux distribution?

A) gnome

B) kde

C) unity

D) None of above

8. Parity and data are shared among all N + 1 disks in RAID level

A) 2

B) 4

C) 5

D) 6

9. The addressing mode, where you directly specify the operand value is

A) direct

B) relative

C) indirect

D) Immediate

 10. RISC machines have

A) less number of registers and less instructions

B) large number ofregisters and less instructions

C) less number of registers and more instructions

D) large number of registers and more instructions

11. The associatively mapped virtual memory makes use of

A) TranslationLook-aside Buffer

B) Page Table

C) Frame Table

D) None of the above

12. The capacitance of a reverse blased PN junction

A) increases as reverse bias is increased

B) decreases asreversis decreased

C) increases as reverse bias is decreased

D) is significantly low

13. Which of the following controls voltage?

A) Resister

B) Diode

C) Transistor


14. The value of a in a transistor is

A) equal to 1

B) less than 1 andmore than 0.9

C) about 0.4

D) about 0.1

15... can not be fabricated on an IC.

A) Transistors

B) Diodes

C) Resistors

D) Large inductors andtransformers

16. When a pentavalent impurity is added to a pure semiconductor, it becomes

A) an insulator

B) an intrinsic semiconductor

C) p-type semiconductor

D) n-typesemiconductor

17. External devices that are connected to a computer system are known as

A) expansion cords

B) peripheral devices

C) buses

D) slots

18. Which of the following is not a type of motherboard expansion slot?





19. Boot sequence is changed from

A) Setting

B) Control Panel

C) Taskbar


20. Which would you have to upgrade to install an EIDE drive?


B) A 286 CPU

C) Controller Board

D) ISA Motherboard

 1. Which backup is useful for high end system?

A) 4 mm helical


C) 8 mm helical


22. Where should you look to interpret different beep codes?

A) CPU manufacturer

B) BIOS manufacturer

C) Memory manufacturer

D) Flash manufacturer

 23. Which one displays fake virus alerts?

A) Keylogger

B) Computer worm

C) Scareware

D) Computer virus

24. Storage capacity of magnetic disk depends on

 A) tracks per inch of surface

B) bits per inch oftracks

C) disk pack in disk surface

D) All of above

 25......... are main memory.

A) Primary and Secondary

B) Sequential and Random

C) Hard disk and Pendrives

D) RAM and ROM

 26. As per Electronic Transaction Act-2063, which organization issues issues digital Signature/digital certificate to end users?





 27. When was the first time computer used in Nepal?

A) 2018

B) 2028

C) 2038

D) 2048

28. CSS comes in...... types.

A) 2

B) 3

C) 4

D) 5

29. Client and web server have a connection of type

A) Continuous

B) Dependent

C) Permanent

D) Non continuous

30. An alternative of Javascript on windows platform is

A) VBScript




31. Which notation is used to end any HTML tag?

A) //

B) /

C) *

D) I

32. Function which causes retrieval of any kind of data from database is considered as

A) key

B) query

C) structure

D) storing cycle

33. The basic data type char(n) is a...length character string and varchar(n) is……length character.

A) Fixed, Equal

B) Equal, Variable

C) Fixed, Variable

D) Variable, Equal

34.Commit and rollback are related to

A) data integrity

B) data consistency

C) data sharing

D) data checking

35. The term attribute is referred by

A) row

B) record

C) key

D) column

36. In which Normal Form there exists transitive dependency?

A) First Normal Form

B) Second Normal Form

C) Third Normal Form

D) All of the above

37. Feature which allows as to view slides in a slide show without manually advancing each slide is

A) adding build effect

B) setting slide time

C) adding transition

D) adding bullets 

38. If you want to print slides without color and background which option do you select?

A) Grayscale

B) Pure black andwhite

C) Black

D) White

39. The arrangement of elements such as title and subtitle text, pictures, tables etc is called

A) layout

B) presentation

C) design



40. Which option is there when you click Insert menu and then Table button in MS PowerPoint?

A) Insert table

B) Draw table

C) Excel Spreadsheet

D) All of the above


41. You want to track the progress of the stock market on a daily basis. Which type of chart do you use?

A) Pie chart

B) Row chart

C) Line chart

D) Column chart 

42. A feature that displays only the data in column(s) according to specified criteria

A) formula

B) sorting

C) filtering

D) pivot

43. Cell range A3 through G3 should be written as

A) A3-G3

B) A3?G3

C) A3:G3

D) A3 to G3

 44. Which is used to replace a repetitive series of keyboard and mouse actions?

A) Mail merge

B) Auto shape

C) Macros


 45. Word processor command which issued to move selected text to another part of a

document is

A) drag and drop

B) copy and paste

C) find and replace

D) cut and paste

 46. Indention in computer word processing is used to

A) make the textreadable

B) change the paragraph color

C) apply border around text.

D) change line spacing

 47. A structure of linked elements through which the user can navigate, interactive multimedia becomes

A) Hypermedia

B) Hypertext

C) Intermedial

D) Digital media:

 48. A video consists of a sequence of

A) frames

B) packets.

C) signals

D) pulses

49. Which of the following is a technique to blend two or more images to form a new image?

A) modeling

B) morphing

C) animating

D) wraping

50. Which one of the following extends and attends private network across public networks?





Post a Comment (0)
Previous Post Next Post