Computer Operator(Province) 2078/11/14


Province Public Service Commission

Gandaki Province

 Computer Operator (Province) 2078/11/14

The key of the question paper must be mentioned in the answer sheet. Failure to do so will result in cancellation of the answer sheet. Also, electronic devices like Calculator and Mobile will not be used in the exam.

1. The feature in word processor that enables to send same letter by addressing different persons:

A. Template

B. Mail Merge

C. Hyperlink

D. Macros


2. Gutter margin is:

A. Margin that is added to left margin when printing

B. Margin that is added to right margin when printing

C. Margin that is added to the binding side of page

D. Margin that is added to the outside of the page when printing


3. A computer operator needs to search all files whose file name starts with 'H' and ends in 'X'. It has an extension of docx. The correct search text is:

A. H*X.docx 

B. *H*X.docx

C. *H*X.* 

D.H.X. docx


4. The command used by an user to create a new directory is:

A. mkdir

B. dir

C. chdir

D. chkdsk


5. Which of the operating system is not open source?

A. Linux Operating system

B. Apple macOs

C-Free BSD operating system

D. All of the above the process to copy data from one location and store in another location as an alternative incase the original data is lost.

A. Restore

B. Backup

C. Format

D. Delete


7. Which type of software is operating system?

A. Communication software

B. Application software

C. System software

D. Word processing software


8. Which software prevents the external access to a system?

A. Firewall

B. Gateway

C. Router

D. Virus checker


9.......refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation and sound.

A. An executable file 

B. Desktop publishing 

C. Multimedia

D. Hypertext


10. Which of the following languages enables storing, retrieving and manipulating data in databases?

A. Java



D. Hypertext


11. The topology which requires a central controller or hub is called as:

A. Mesh Topology 

B. Star Topology

C. Bus Topology 

D. Ring Topology


12) Which of them is not a Network Topology?

A. Star

B. Mesh

C. Ring

D.Peer to Peer


13. The ASCII value of Letter 'A' is:

A. 97

B. 67

C. 65

D. 95 


14. As per the Electronic Transaction Act 2008, the digital signature and certificate may be revoked for:

A. Death of the subscriber

B. Upon proving that requirements were not fulfilled completely 

C. If false information were provided during issuance

D. All of the above 


15. Which of the following is the high speed memory used in computer?


B. Hard disk

C. Cache memory



16. Pasting a website content to MS-Word to reflect the style of word document's cursor can be achieved by:

A. Ctrl+V 

B. Ctrl+Alt+V


D. Alt+Shift+V 


17. A computer operator is writing in Preeti Font. Same characters do change while being typed. The correct location to customize the setting to disable the auto changing is:

A. Symbols

B. Macros

C. Spelling and Grammar

D. Auto Correct


18. Example of computer font is:

A. Bold

B. Italic

C. Arial

D. 40pt


19. The page default size is letter. It needs to be change to A4. It can be done by setting:

A. Page Layout 

B. Ruler

C. Format Painter

D. Section Break


20. Choose the applications which provide the facilities of word processing:

A. Microsoft Word

B. Open Office Writer

C. WordPad

D. All of the above


21. When designing an HTML page, the title bar text can be changed by using:

A. <head>...</head>

B. <body> <title>...</title> </body>

C. <head> <title>... </title> </head>

D. <body> <hl>....</h1> </body>


22. The binary equivalent of decimal number 89,625 is

A. (101 100 1.101)2

B. (1100111.110)2

C. (1111.01100)2

D. None of the above


23. Where is computer virus usually hidden?

A. Operating System 

B. Application Program

C. Disk Driver

D. Both A & B


24. If you combine B5, B6, C5 and C6 cells, you will get a big cell. What address will be

A. B5C5

B. B5

C. C5

D. B5C5B6C6


25. To run a presentation from the slide where the slide was previously stopped

at, the shortcut key is: 

A. Shift+F5

B. F5

C. Ctrl+Shift+F5

D. Alt+Shift+F5



26. a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys:

A. Schema diagram

B. Relational algebra 

C. Database diagram

D. Schema flow


27. How do you generate "Table of Contents" in word file? 

A. Go to References and select Table of Contents

B. Go to References and select Update Table 

C. Go to Insert and select Table of Contents 

D. Go to Insert and select Update Table


28. Which of the following is related to the services provided by cloud?

A. Sourcing


C. Reliability

D. Paas


29. Which of the following is not an open-source software?

 A. Libre Office

B. Microsoft Office

C. Open Office 

D. VLC media player


30. FOSS is the:

A. Open-source software 

B. Free and open-source software 

C. Proprietary software/

D. Public Domain Software


31. Which cloud computing feature allows the service to change in size or volume to meet user needs? 

A. Security

B. Scalability 

C. Cost Saving 

D. Virtualization


32. Which of the following support presentation application?

A. Google slides

B. Microsoft PowerPoint 

C. Libre Office Impress

D. All of the above


33. Which of the following is not the advantage of database?

A. Increase Data Dependency

B. Reduce Data Redundancy

C. Increase Data Consistency

D. Data Security


34. SQL data type to denote a character string value is:

A. Char

B. Varchar

C. Text

D. All of the above


35. Which one of the following is a set of one or more attributes taken collectively to uniquely identify a record?

A. Candidate key

B. Sub key

C. Super key

D. Foreign key


36. Libre Office Base is a

A. Database Management Application

B. Word Processing Application

C. Spreadsheet Application

D. Presentation Application


37. The COUNTII can be used her 

A. Coum specific values

B: Count based on a condition 

C. Both A & B.

D. None of the above


38. An operator gives a range C30:L100. The cell that does not fill in this range is:

A. J31

B. L30

C. F99

D. N33


39. When you click on a spreadsheet, a rectangular box with thick outlines becomes prominent. It is called:

A. Workbook

B. Active cell

C. Cell

D. Locked cell


40. What is the output of cell containing number 456.783, when formatted to "###


B. 456.78

C. 4.56

D. 4.78


41. To return remainder after a number is divided by a divisor in Excel, which function is used? 

A. DIV ()


C. FACT() 

D. MOD ()


42. What PowerPoint feature will you use to apply motion effects to different objects of a slide?

A. Animation Scheme

B. Slide Transition

C. Animation Objects

D. Slide Design


43. If Ram transfers ownership of a Google Docs file to Shyam. Which of the       

following rights is still available to Ram?

A. Change visibility options of the file 

B. Permanently delete the file 

C. Edit the file

D. Share file with others


44. An image editor which is similar to Adobe Photoshop is: 


B. Open Office

C. Blue Fish

D. GIMP shop


45, Which of the following tag is used to add rows in the table?

A. <td> and </td>

B. <tr> and </tr>

C. <th> and </th> 

D. None of the above


46. What should be the first tag in any HTML document?

A. <head>

B. <title>

C. <html>

D. <document>


47. The arrangement of name list in sequential order is called:

A. Formatting

B. Sorting

C. Ordering

D. Listing


48. The formula to add number in cell A3 with the number in cell A4 is:

A. avg(A3:A4) 

B. sum(A3:44) 

C. sum(A3:A4) 

D. sum(A3A4)


49. A spreadsheet cell that is highlighted with heavy border is: 

A. Active Cell 

B. Passive Cell

C. Lock Cell 

D. Permanent Cell


50. not spreadsheet program.

A. Microsoft Excel

B. Numbers

C. Libre Office Cale

D. Libre Office Impress


The End




Post a Comment
Previous Post Next Post