Karnali Province 2080.02.08

 


Karnali Province

Assistant Computer Operator

2080.02.08

Part-A: Objective Questions                                                               35 x 1=35 Marks

1. Which statement is FALSE regarding the recycle bin?
A. You can find deleted files in recycle bin.
B. You can restore any files in recycle bin if you ever need.
C. You can increase free space of disk by sending files in recycle bin.
D. You can right click and choose empty recycle bin to clean it at once

2. In DOS, which command is used to clear the screen and display the prompt?
A. Clear
B. Erase
C. Cls
D. Flush

3. Which windows feature lists the applications running on your computer?
A. Disk Defragment
B. Disk Monitor
C. Program and Feature
D. Task Manager

4. Indentation in computer word processing is used to
A. make the text readable
B. change the paragraph color
C. apply border around text
D. change line spacing

5. Which of the following is not necessary to perform a mail-merge operation?
A. main document
B. word fields
C. data source
D. merge fields

6. Which of the following is printed at the bottom of each page?
A. Footer
B. Footmark
C. Foot set
D. Bottom section

7. To assign a name to a specific location in a document we use ..........
A. Go To
B. Page Setup
C. Bookmark
D. Macro

8. Portrait and Landscape are
A. Page Sizes
B. Page Orientations
C. Page Layouts
D. Page Setups

9. Word wrap feature........
A. sets text inside the fixed margin
B. appears at the bottom of the document
C. marks the paragraph center
D. applies border around text

10. Which key is used to check for spelling and grammar?
A. F3
B. F5
C. F7
D. F9

11. What is the cell address for a cell in 4th row and 3rd column?
A. C4
B. 4C
C. 3D
D. D3

12. The process of arranging the items of a column in some sequence or order
is known as
A. Sorting
B. Filtering
C. Pivoting
D. Forecasting

13............is getting data from a cell in a different sheet.
A. Referencing
B. Functioning
C. Updating
D. Accessing

14. Which of the following represents absolute cell reference?
A. B3
B. $B$3
C. B$3
D. SB3

15. Which of the following is not a logical operator?
A. =>
B. <=
C. =
D. +

16. Which chart would be better to track the progress of the stock market on a daily basis?
A. Pie Chart
B. Row Chart
C. Line Chart
D. Column Chart

17. In electronic spreadsheet. SUM, AVERAGE, MIN and MAX are examples of
A. functions
B. calculations
C. formulas
D. expressions

18. To highlight only cells in a range having a greater than or less specific value, we can use
A. Data validation
B. Conditional formatting
C. What-if analysis
D. Consolidate

19.Which of the following is not the data type in MS-Access?
A. Number
B. Date

C. Text
D. Identifier

20. Which of the command can be used to modify a column in a table?
A. alter
B. update
C. set
D. create

21. In MS-Access, you can use a.........to answer a simple question, to perform calculations, to combine data from the different tables, or even to add, change, or delete table data.
A. Query
B. Forms
C. Pivot Chart
D. Report

22. A search value in SQL query can be a specific value or it can be...
A. Comparison operator
B. Logical operator
C. Relationship
D. Wild card character

23. You want to create a new presentation by selecting ready-made font color and graphics. What do you use?
A. Base Template
B. Master Slide Theme
C. Design Template
D. Master Template

24. Which powerpoint view displays each slide of the presentation as a thumbnail and is useful for rearranging slides?
A. Slide Master
B. Slide Show
C. Slider Sorter
D. Notes Page

25. On which of the following, the animation is applied?
A. Slides
B. Objects
C. Views
D. Designs

26. Boot sequence is changed from.....
A. Setting
B. Control Panel
C. Taskbar
D. BIOS

27. Text is captured by scanner with
A. Keyboard
B. Mouse
C. Input hardware
D. Optical character recognition

28. What is the address given to a computer connected to a network called?
A. Network Address
B. Routing Address
C. IP Address
D. DNS Address

29............is a collection of data, programs, procedures, routines and instructions that tell a computer or electronic device how to run, work and execute specific tasks.
A. Hardware
B. Network
C. Software
D. System

30. Which of the following is a valid encoding format?
A. UTF-1
B. UTF-A
C. UTF-8
D. UTF-10

31. Which of the following is a light sensitive device that converts drawing, printed text or other images into digital form?
A. Keyboard
B. Plotter
C. Scanner
D. OMR

32.................... is a type of software that is embedded directly into a piece of hardware.
A. Firmware
B. Cache
C. Operating System
D. Middleware

33. ................. is the ratio of the horizontal length to the vertical length in Monitor.
A. Aspect Ratio
B. Contrast
C. Resolution
D. Interlacing

34.  What does a collection of hyperlinked documents on the internet form?
A. World Wide Web (www)
B. E-mail System
C. Hypertext Markup Language (HTML)
D. Intranet

35.................. a is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
A. Switch
B. Router
C. Firewall
D. Server

Part-B: Subjective Questions                                                             3 x 5=15 Marks

1. Briefly explain common security threats in computer systems.

Common security threats in computer systems:

a) Malware: Malware refers to malicious software designed to gain unauthorized access, cause damage, or collect sensitive information. It includes viruses, worms, trojans, ransomware, and spyware. 

b) Phishing: Phishing is a technique used to trick users into revealing sensitive information, such as passwords or credit card details, by posing as a trustworthy entity via email, instant messaging, or websites.

c) Denial of Service (DoS) Attacks: DoS attacks aim to overwhelm a system or network with a flood of illegitimate requests, rendering it inaccessible to legitimate users. 

d) Man-in-the-Middle (MitM) Attacks: In a MitM attack, an attacker intercepts and potentially alters communication between two parties without their knowledge, allowing them to eavesdrop or manipulate data.

e) Social Engineering: Social engineering involves manipulating individuals into revealing confidential information or performing actions that compromise security. 

f) Password Attacks: These involve various methods, such as brute-force attacks or dictionary attacks, to crack passwords and gain unauthorized access to systems or accounts.

g) Data Breaches: Data breaches involve unauthorized access to sensitive information, often due to poor security practices, vulnerabilities, or insider threats.

 

2. What is an operating system? Explain in detail the functions of an operating system.

An operating system (OS) is a software that manages computer hardware and provides an interface between the user and the underlying hardware. It performs various functions to ensure efficient utilization of system resources and to provide a convenient and secure environment for users. Here are the key functions of an operating system: 

a) Process Management: The OS manages and controls processes, which are executing instances of programs. It schedules processes, allocates resources, and provides mechanisms for process communication and synchronization. 

b) Memory Management: The OS allocates and tracks system memory to processes, ensuring efficient memory utilization. It handles memory allocation, deallocation, and swapping processes in and out of memory when needed. 

c) File System Management: The OS provides a hierarchical structure for organizing and storing files on secondary storage devices. It manages file operations, such as creation, deletion, reading, and writing, and ensures data integrity and security.

d) Device Management: The OS interacts with and manages various hardware devices, such as input/output devices, storage devices, and network interfaces. It provides drivers and handles device operations, including device allocation, scheduling, and error handling. 

e) User Interface: The OS provides a user interface through which users interact with the computer system. This can be a command-line interface, graphical user interface (GUI), or a combination of both, allowing users to run programs, manage files, and configure system settings.

 

f) Security and Protection: The OS enforces security measures to protect the system and user data. It controls access to resources, implements user authentication and authorization, and ensures data privacy and integrity. It also detects and handles security threats, such as malware or unauthorized access attempts.

g) Network Management: In networked environments, the OS enables communication between computers and manages network connections, protocols, and configurations. It facilitates network resource sharing and supports distributed computing and file sharing.

Overall, an operating system acts as a bridge between the user and the computer hardware, providing an environment for executing programs, managing resources, and ensuring system stability, security, and usability.

 

3. Briefly explain about any five built-in functions in MS-Excel.

Five built-in functions in MS-Excel:

a) SUM: The SUM function allows you to calculate the sum of a range of cells. For example, "=SUM(A1:A5)" would add the values in cells A1 through A5 and provide the total.

b) AVERAGE: The AVERAGE function calculates the average value of a range of cells. For instance, "=AVERAGE(A1:A5)" would give you the average of the values in cells A1 through A5.

c) VLOOKUP: The VLOOKUP function allows you to search for a value in the leftmost column of a table and retrieve a corresponding value from a specified column. It is commonly used for data lookup and referencing. For example, "=VLOOKUP(A2, B1:D10, 3, FALSE)" would search for the value in cell A2 within the range B1 to D10 and return the corresponding value from the third column.

d) COUNT: The COUNT function counts the number of cells within a specified range that contain numeric values. It can be useful for counting the occurrence of specific data points or determining the number of filled cells in a range. For instance, "=COUNT(A1:A10)" would count the number of cells in the range A1 to A10 that contain numbers. 

e) IF: The IF function allows you to perform conditional evaluations. It evaluates a given condition and returns different values based on whether the condition is true or false. This function is handy for creating logical tests and performing different actions based on the results. For example, "=IF(A1>10, "Yes", "No")" would check if the value in cell A1 is greater than 10 and return "Yes" if true, or "No" if false.

-Good Luck-


Post a Comment (0)
Previous Post Next Post