Answer Key-1

 1.     The invention of …….. gave birth to the much cheaper micro-computers?

(A) Transistor                 

 (B) Integrated circuit           

 (C) Microprocessors     

(D) CPU 

Ans. (C) Microprocessors  

 Explanation: The invention of microprocessors (also called a single-chip CPU) gave birth to much cheaper microcomputers. A microcomputer is a small, relatively inexpensive computer with a microprocessor as its central processing unit (CPU). It includes a microprocessor, memory and minimal input/output (I/O) circuitry mounted on a single printed circuit board (PCB). Microcomputers became popular in the 1970s and 1980s with the advent of increasingly powerful microprocessors.   

2.     Which of the following is combined into a CPU?

(A) Input and Output                                                      

(B) Memory and interface device

(C) Control unit and an arithmetic logic unit              

(D) Control unit and output device

Ans. (C) Control unit and an arithmetic logic unit

Explanation: Principal components of a CPU include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that orchestrates the fetching (from memory) and execution of instructions by directing the coordinated operations of the ALU, registers and other components..

3.     ASCII stands for

(A) American Stable Code for International Interchange

(B) American Standard Case for Institutional Interchange

(C) American Standard Code for Information Interchange

(D) American Standard Code for Interchange Information

Ans. (C) American Standard Code for Information Interchange 

Explanation: ASCII, abbreviation of American Standard Code For Information Interchange, a standard data-transmission code that is used by smaller and less-powerful computers to represent both textual data (letters, numbers, and punctuation marks) and non-input-device commands (control characters). Like other coding systems, it converts information into standardized digital formats that allow computers to communicate with each other and to efficiently process and store data.

4.     What could cause a fixed disk error?

(A) No CD installed                                      

 (B) Bad RAM

(C) Slow processor                                       

(D) Incorrect CMOS settings

Ans. (D) Incorrect CMOS settings

5.     BIOS stands for?

(A) Base Interface Operating System             

(B) Basic Input-Output System

(C) Base Interaction for Output System          

(D) Basic Interface to Operating System

Ans. (B) Basic Input Output System

Explanation: In computing, BIOS (an acronym for Basic Input/Output System and also known as the System BIOS, ROM BIOS or PC BIOS) is the firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.

6.      Which of the following memories need refreshing?

(A) SRAM             

(B) DRAM                  

(C) ROM                     

(D) All of the above

Ans. (B) DRAM

Explanation: DRAM memories needs refreshDynamic random access memory (DRAM) is a type of memory that is typically used for data or program code that a computer processor needs to function. DRAM is a common type of random access memory (RAM) used in personal computers (PCs), workstations and servers.

7.     As per Electronic Transaction Act, 2053, which organization issues digital signature to end users?(A) OCC                

(B) DOIT                     

(C) CA                         


Ans. (A) OCC

Explanation: After the enactment of the Electronic Transaction Act 2063 Digital Signature Certificates are legally valid in Nepal. Digital Signature Certificates are issued by licensed Certifying Authorities OCC under the Ministry of Science and Technology, Government of Nepal as per the Electronic Transaction Act.

8.     The ALU of a computer normally contains a number of high-speed storage elements called.

(A) Semiconductor memory     

(B) Resisters             

(C) Hard disks           

(D) Magnetic disk

Ans. (B) Registers

Explanation:The ALU of a computer normally contains a number of high-speed storage elements called Registers.A processor register (CPU register) is one of a small set of data holding places that are part of the computer processor. A register may hold an instruction, a storage address, or any kind of data (such as a bit sequence or individual characters). Some instructions specify registers as part of the instruction.

9.     Hexadecimal number system uses

(A) 0 to 9 and A to F                   

(B) 0 to 15     

(C) 0 to 10 and A to E         

(D) 0 to 9

Ans. (A) 0 to 9 and A to F

Explanation: In mathematics and computing, the hexadecimal (also base 16 or hex) numeral system is a positional numeral system that represents numbers using a radix (base) of 16. Hexadecimal uses 16 distinct symbols, most often the symbols "0"–"9" to represent values 0 to 9, and "A"–"F" (or alternatively "a"–"f") to represent values 10 to 15.

10. Computer was used in Nepal for census for the time in (B.S.)

(A) 2018               

(B) 2020                     

(C) 2028                                 

(D) 2030

Ans. (C) 2028

Explanation: Nepal brought a computer for census of 2018 BS. This computer was of second generation.The history of computer in Nepal is not that old since Nepal has not given any contribution in the development of evolution of computer. It was in 2028 B.S. when HMG brought IBM 1401 (a Second Generation computer) on rent for Rs. 1 lakhs and 25 thousand per month to process census data. Later the computer was bought by National Computer Center (NCC). In 2038 B.S., a fourth generation computer was imported with the aid of UNDP and UNFPA from England for 20 lakhs US dollars. Its name was ICL 2950/10. This computer had 64 terminals and it is kept in museum now.

11. A list of protocols used by a system, one protocol per layer, is called

(A) protocol architecture    

(B) protocol stack    

(C) protocol suit   

(D) none of the above

Ans. (B) protocol stack

Explanation: Protocol stack is the usual name for a set of protocols. Of course it’s more like a stack of pancakes than a stack in the usual computer science sense (i.e. a data structure with push and pop operations), but the meaning is usually clear from context.

12. Which law of Nepal describe crime and punishments for Cyber Crime?

(A) Information Technology Act                      

 (B) Cyber Security Act

(C) Electronic Transaction Act                          

(D) Information Protection Act

Ans. (C) Electronic Transaction Act

Explanation: The current legal framework on cybercrime and electronic evidence in Nepal mostly addresses crimes against electronic and financial transactions through its Electronic Transactions Act, 2063 (2008)/ETA and Banking Offence and Punishment Act 2064 (2008).

13. To create or change name of volume of disk:

(A) VOLUME                    

(B) FAT                      

(C) NAME                   


Ans. (D) LABEL

Explanation: A volume label, sometimes called a volume name, is a unique name assigned to a hard drive, disc, or other media.In computing, label is a command included with some operating systems (e.g., DOS, IBM OS/2, Microsoft Windows and ReactOS). It is used to create, change, or delete a volume label on a logical drive, such as a hard disk partition or a floppy disk. Used without parameters, label changes the current volume label or deletes the existing label.

14. What is the main function of operating system?

(A) manage the computer resources

(B) establish a user interface

(C) execute and provide services for application

(D) All of the above

Ans. (D) All of the above

Explanation: An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

15. Which of the following is not related to the File Management of OS?

(A) Storage                                              

(B) Retrieval

(C) Sharing and Pairing                         

(D) Naming and protection of file

Ans. (A) Storage

16. User-accessible setup of configuration directives evaluated by the operating system during boot is in

(A) AUTOEXEC.BAT        

(B) AUTOEXEC.SYS             

(C) CONFIG.BAT       



Explanation: CONFIG. SYS is the primary configuration file for the DOS, OS/2 as well as similar operating systems. It is a special ASCII text file that contains user-accessible setup or configuration directives evaluated by the operating system during boot. CONFIG. SYS was introduced with DOS 2.0.

17. What do you call a small part of taskbar that has icons of background running applications?

(A) Start button               

(B) Quick launch       

(C) Task bar              

(D) System Tray

Ans. (D) System Tray

Explanation:An area on the right side of the Taskbar on the Windows interface used to display the status of various functions, such as speaker volume and modem transmission. Applications also insert icons on the System Tray to give you a quick entrance into either the application itself or some auxiliary function.

18. Which are not the common features of Windows?

(A) It is multitasking, multi user and multi threading operating system

(B) It supports virtual memory management system

(C) It allows to schedule various tasks

(D) It is multitasking, multi user and single threading operating system

Ans. (D) It is multitasking, multi user and single threading operating system

19. To open the command line of DOS in Windows, one has to execute

(A) cml                              

(B) cmd                      

(C) acml                                 

(D) cmdl

Ans. (B) cmd

Explanation: Click Start.In the Search, type cmd (short for command), and press Enter.

20. A system tool that improves computer performance in windows is

(A) disk scanning            

(B) backup                 

(C) disk defragmenter         

(D) format

Ans. (C) disk defragmenter

Explanation: Microsoft Drive Optimizer (formerly Disk Defragmenter) is a utility in Microsoft Windows designed to increase data access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation. Defragmenting a disk minimizes head travel, which reduces the time it takes to read files from and write files to the disk.

21. An application that allows the user to compose and edit simple documents is known as

(A) spreadsheet              

(B) word processor              

(C) powerpoint          

(D) browsers

Ans. (B) word processor

Explanation: a word processor is a software program capable of creating, storing, and printing typed documents. Today, the word processor is one of the most frequently used software programs on a computer, with Microsoft Word being the most popular word processor.

22. What is the name of tool in MS Word used to apply same format to different character or paragraph?(A) Format Painter                                 

 (B) Format Duplicator        

 (C) Format Repeater                             

 (D) Format Copier

Ans. (A) Format Painter

Explanation:  A feature in Microsoft Word that applies a style from one part of the document to another. The text with the desired style (font, size, etc.) is highlighted and Format Painter (paint brush icon) is clicked. Whichever text is highlighted next is then changed to the desired style.

23. What do you call the vertical separation between columns?

(A) Gutter                         

(B) Margin                 

(C) Index                   

 (D) Orientation

Ans. (B) Margin

Explanation: In typography, a margin is the area between the main content of a page and the page edges. The margin helps to define where a line of text begins and ends. When a page is justified the text is spread out to be flush with the left and right margins.

24. In MS-Word, a word is known as.

(A) A string of letters or numbers                   

(B) 16 or 32 bits       

(C) Any language word                                     

(D) None of the above

Ans. (A) A string of letters or numbers

25. Which of the following statements is false?

(A) You can set different header and footer for last page of a section

(B) You can set different header footer for even and odd pages

(C) You can set different page number formats for different sections

(D) You can set different header footer for first page of a section.

Ans. (A) You can set different header and footer for last page of a section

Explanation: A header is the common content that is displayed at the top of each page, while the footer is common content that is displayed at the bottom of each page.By default, all pages in a Word document use a common header and/or footer. You can, however, customize the document such that you have different headers and/or footers on any one or more of the following:·         First page·         Odd and even pages.

26. Which is the functions of Shift+F7 keys in MS Word?

(A) Open the editor pane and start a spelling and grammar check

(B) Open the thesaurus

(C) Open the translation pane

(D) All of the above

Ans. (B) Open the thesaurus

Explanation: Shift+F7: Open the thesaurus. If you have a word selected when you press this combo, Word opens the thesaurus and looks up the selected word.

27. Which feature do you use to monitor all document changes?

(A) Edit document          

(B) Spelling check    

(C) Track change     

(D) Monitor change

Ans. (C) Track change

Explanation: The Track Changes function in Word allows you to keep a record of amendments made to a document. You can then choose to accept or reject the amendments. It is a useful tool for managing changes made by several reviewers to the same document..

28. What happens when dollar signs ($) are entered in a cell address?

(A) An absolute cell address is created

(B) Cell address will change when it is copied to another cell

(C) The sheet tab is changes

(D) The status bar does not display the cell address.

Ans. (A) An absolute cell address is created

Explanation: An absolute reference in Excel refers to a reference that is "locked" so that rows and columns won't change when copied. Unlike a relative reference, an absolute reference refers to an actual fixed location on a worksheet. To create an absolute reference in Excel, add a dollar sign before the row and column.

29. In which chart, only one data series can be plotted?

(A) Pie                  

(B) Line                      

(C) Bar            

(D) Column

Ans. (A) Pie

Explanation: Pie charts show the size of items in one data series, proportional to the sum of the items. The data points in a pie chart are shown as a percentage of the whole pie. Consider using a pie chart when: You have only one data series..

30. Outline border to the selected cells in MS Excel is applied when …….. is pressed ?

(A) Ctrl+Alt+&      

(B) Ctrl+Shift+~          

(C) Ctrl+Shift+7          

(D) Ctrl+Shift+%

Ans.(C) Ctrl+Shift+7 

Explanation: To just apply thin borders outside the selection use shortcut CTRL+SHIFT+7. Or sequential shortcut ALT>H>B>S. You can also go to home tab.   

31. In the formula, which symbol specifies the fixed columns or rows?

(A) $                      

(B) *                            

(C) %                           

(D) &

Ans. (A) $

Explanation: If you do not want cell references to change when you copy a formula, then make those cell references absolute cell references. Place a "$" before the column letter if you want that to always stay the same. Place a "$" before a row number if you want that to always stay the same.

32. The cell pointer must be in ….. to apply goal seek command.

(A) the changing cell whose value we need to find

(B) the cell where target value is entered

(C) the result cell where formula is entered

(D) None of the above

Ans. (C)  the result cell where formula is entered

Explanation: Goal Seek is a built-in Excel tool that allows you to see how one data item in a formula impacts another. Goal seek is a special type of what if tool that determines which cell in a worksheet needs to change to reach the required answer. Goal seek uses the result that you want and calculated one of the values that you need, to achieve it.Goal Seek requires three components: a formula to run values through; a target value to achieve and; a cell that it can change while testing the values. The cell to be changed must be referred to in the formula.

33. A collection of related data is known as.

(A) Data Series               

(B) Information                    

 (C) Database             

(D) Metadata

Ans. (C) Database

Explanation: Database is an integrated collection of logically related records or files. A database consolidates records previously stored in separate files into a common pool of data records that provides data for many applications. The data is managed by systems software called database management systems (DBMS).

34. Which of the following is the correct order of keywords for SQL SELECT statements?

(A) SELECT, WHERE, FROM                              


(C) WHERE, FROM, SELECT                              



Explanation: The SQL SELECT statement returns a result set of records, from one or more tables. A SELECT statement retrieves zero or more rows from one or more database tables or database views. The following SQL statement selects all the customers from the country "Mexico", in the "Customers" table: SELECT * FROM Customers WHERE Country='Mexico';

35. What are the columns in a Microsoft Access table called?

(A) Rows                          

(B) Fields                   

(C) Cells                     

(D) Record

Ans. (B) Fields

Explanation: Access Tables are a grid made up of rows and columns. So, simply, a column in an access table is also known as a field.

36. The basic elements of a form or a report are.

(A) Controls              

 (B) Objects                

(C) Windows            

 (D) Properties

Ans. (A) Controls

37. What is the size of Yes/No field?

(A) 1 bit                

(B) 1 byte                   

(C) 1 kilobyte             

(D) 1 character

Ans. (A) 1 bit

Explanation: Fields that will contain only one of two values, such as Yes/No, True/False, On/Off is 1 bit.

38. Which one of the following is not the type of data validation?

(A) Uniqueness   

(B) Consistent expression    

(C) No null values 

(D) All  of the above

Ans. (C) No null values  

Explanation: When setting up a workbook for your users, you may often want to control information input into specific cells to make sure all data entries are accurate and consistent. Among other things, you may want to allow only particular data type such as numbers or dates in a cell, or limit numbers to a certain range and text to a given length. You may even want to provide a predefined list of acceptable entries to eliminate possible mistakes. Excel Data Validation allows you to do all these things in all versions of Microsoft Excel 2016, 20013, 2010 and lower.

39. What is the result of a query?

(A) a field             

(B) a record               

(C) a query                

(D) a dynaset

Ans. (D) a dynaset

Explanation: Dynaset - set of records that make up the answer to query request (dynamic set of records). Dynamic because if table changes on which the query depends the results of query will change along with it.

40. A ……. is used to make design changes to reports in MS Access.

(A) print preview                                    

 (B) report view         

(C) layout view                                       

(D) none of the above

Ans. (C) layout view

Explanation: Layout view is a more visually-oriented view than Design view. While viewing a form in Layout view, each control displays real data. As a result, this is a very useful view for setting the size of controls, or performing many other tasks that affect the visual appearance and usability of the form.Certain tasks cannot be performed in Layout view and require switching to Design view. In certain situations, Access displays a message telling you that you must switch to Design view to make a particular change..

41. Which of the following key can be used to view slide show?

(A) F1                               

 (B) F2                         

(C) F5                         

(D) F10

Ans. (C) F5

Explanation: F5 is probably the most often used function key in PowerPoint. You can quickly see how your slide show looks in full screen.

42. What lets you to create new presentation by selecting ready-made font color and graphics effects?(A) presentation template                     

(B) design template            

(C) blank presentation                         

 (D) animation scheme

Ans. (B) design template

Explanation: PowerPoint has the ability to use templates to create presentations. These templates are designed to give your slide presentations a consistent appearance. Templates are ready-to-use presentations into which you put your own information. You can use the templates provided or create your own.

43. Which notation is used to end any HTML tag?

(A) //                   

  (B) /                            

(C) *                            

(D) |

Ans. (B) /

Explanation: slash, an end tag, in which the element name is prefixed with a slash: </ tag > . In some versions of HTML, the end tag is optional for some elements.

44. What is the server called on the internet connection?

(A) Host             

 (B) Router             

 (C) Hub                      

(D) Gateway

Ans. (A) Host

Explanation: the term server refers to a computer program or process (running program). It refers to a device used for (or a device dedicated to) running one or several server programs. On a network, such a device is called a host.

45. The correct sequence of HTML tags for starting a webpage is

(A) Head, Title, HTML, Body                 

(B) HTML, Body, Title, Head

(C) HTML, Head, Title, Body                 

(D) None of the above

Ans. (C) HTML, Head, Title, Body

Explanation: The correct sequence of HTML tags to start a webpage is html, head, title, and body.

46. A communication protocol used by internet is

(A) HTTP                          

(B) TCP/IP                 

(C) WWW                   


Ans. (B) TCP/IP

Explanation: TCP IP is one of the primary protocols of the Internet Protocol suite. It works with and complements IP, which is why the two are often paired together as TCP IP. TCP IP is the most widely used communications protocol..

47. Which of the tags is used for a section heading?

(A) <title> …… </title>     

(B) <h1> …… </h1>   

(C) <p> ……. </p>      

(D) <head> ……. </head>

Ans.  (B) <h1> …… </h1>

Explanation: The heading tag is used in HTML to define headings of a page. Headings are defined by <hn> , with “n” being a number between 1 and 6, and determines which position a heading has in the hierarchy of the heading structure. Heading tags have a particularly important function within an HTML structure.

48. Which server provides a central storage facility to stores files of many users on a network?

(A) Database server       

(B) Name server       

(C) File server           

(D) All of the above

Ans. (C) File server

Explanation: A file server is a central server in a computer network that provides file systems or at least parts of a file system to connected clients. File servers therefore offer users a central storage place for files on internal data media, which is accessible to all authorized clients.

49. A protocol is a set of rules governing a time sequence of events that must take place

(A) between peers                                              

(B) between modems                    

(C) between an interface                                 

 (D) across an interface

Ans. (C) between an interface

Explanation: Between interface is A protocol is a set of rules governing a time sequence of events that must take place.In computing, an interface is a shared boundary across which two or more separate components of a computer system exchange information.

50. The Network Topology with highest reliability is ….

(A) Bus Topology            

(B) Star Topology     

(C) Ring Topology    

(D) Mesh Topology

Ans. (D) Mesh Topology

Explanation: A full mesh topology provides a connection from each node to every other node on the network. This provides a fully redundant network and is the most reliable of all networks. If any link or node in the network fails, then there will be another path that will allow network traffic to continue.

Post a Comment (0)
Previous Post Next Post