Public Service Commission
Open Competitive Written Examination for
Civil Service Hospital, Technician, Engineering & Maintenance, Computer,
Fifth, Computer Technician Posts
2080/05/21
1. Which of the following is
the most common internet protocol?
A) PPP
B) FTP
C) TCP/IP
D) SMTP
2. A framework of policies and
technologies to ensure that the right users have the appropriate access to technology is
known as.......... management.
A) Identity
B) Host based
C) Digitl right
D) Lifecycle
3. IDS stands for.....
A) Interruption Detection
System
B) Intrution Detection System
C) Invasion Detection System
D) Incident Detection System
4. 2FA stands for.....
A) 2 Form Access
B) 2 Factor Access
C) 2 Factor Authentication
D) 2 Form Authentication
5. Which of the following is
not a cyber security threat?
A) Malware
B) Man in the middle
C) Denial of service
D) AES
6. Which of the following is
not required during requirement engineering?
A) Analysis
B) Elicitation
C) Design
D) Documentation
7. Agile software development
model is based on..... development.
A) Linear
B) Incremental
C) Iterative
D) Both B and C
8. In software engineering,
the term CMM stands for.........
A) Capability Maturity
Model
B) Computational Maturity Model
C) Competence Maturity Model
D) Capacity Maturity Model
9. RAD stands for..........
A) Rigorous Application
Development
B) Reliable Application Development
C) Rapid Application Development
D) Realistic Application Development
10. Chairman of NITC is
..........
A) Minister of
Communication and Information Technology
B) Secretary of Ministry of Communication and Information Technology
C) Chief Secretary
D) Deputy Prime Minister
11. One of the goal of ICT
Policy, 2072 is "To make..... percentage of people digitally literate by
2020".
A) 60
B) 65
C) 75
D) 90
12. Which of the following is
not correct goal of ICT Policy, 2072 of Nepal?
A) 75% of Nepali will be
digitally literate by 2020
B) 90% of people shall have access to the broadband services by 2020
C) All Nepali will have access to Internet by 2020
.D) 90% of government services will be online by 2020
13. As per ITERT Operation and
Management Directive, the emergency response team is located in which ministry?
A) Ministry of Home
Affairs
.B) Ministry of Education, Science and Technology
C) Ministry of Communication and Information Technology
D) Ministry of Defense
14. How many characters are
represented by ASCII 8?
A) 127
B) 128
C) 255
D) 256
15. The process of producing
useful information for the user is called.........
A) controlling
B) outputting
C) inputting
D) Processing
16. Which of the following has
the fastest
access time?
A) SSD
B) RAM
C) ROM
D) CPU Register
17. There are three elements
of the communication systems, two are transmitter and receiver, what is the third one?
A) Protocol
B) Channel
C) Space
D) Periphery
18. The term used with memory
of computer is DDR4, DDR stands for......
A) Designated Data Rate:
B) Defined Data Rate.
C) Double Data Rate
D) Dedicated Data Rate
19. HDMI 2.1 version supports
upto Vaishna
A) HD
B) 4K
C) 8K
D) 16K
20. What are the most common a
backup types?
A) Full backup
B) Incremental backup
C) Differential backup
D) All of the above
21. Point out the
connector that transmits both audio and video.
A) BNC
B) HDMI
C) RJ45
D) DVI
22. Where is BIOS stored?
A) CPU
B) RAM
C) ROM
D) Hard Drive
23. FAT stands for......
A) File Access Table
B) File Allocation Table
C) File Activity Table
D) File Accommodation Table
24. Device driver
requires.....
A) Register
B) Main Memory
C) Disk
D) Cache
25. To eliminate unnecessary
fragments and rearrange files and unused disk space to optimize operations is.....
A) Restore
B) Disk Scan
C) Disk Defragmenter
D) Disk Clean-up
26. Which of the following
file system is not supported by Windows OS?
A) exFAT
B) FAT32
C) NTFS
D) NTFS32
27. What is the number of
layers in the OSI model?
A) 2
B) 4
C) 7
D) 9
28. Which of the following is
an unreliable and connectionless protocol?
A) TCP
B) UDP
C) FTP
D) HTTP
29. In.... topology, every
node has a dedicated point to point link to all nodes within the network.
A) Star
B) Bus
C) Ring
D) Mesh
30. A network security device
that monitors and filters incoming and outgoing network traffic based on security
policies is......
A) Access point
B) Router
C) Firewall
D) Controller
31. Which of the following is
lowest in memory hierarchy?
A) Secondary memory
B) Registers
C) RAM
D) Cache memory
32. The 8085 microprocessor
has address bus of length..
A) 8
B) 12
C) 16
D) 32
33. What is used to increase
the apparent size of physical memory?
A) Disks
B) Hard Disk
C) Virtual Memory
D) Secondary Memory
34...... is the average time
required to reach a storage location in memory and obtain its contents.
A) Latency
B) Turnaround time
C) Response time
D) Access time
35. Which of the following
defines the structure of schema of the database?
A) Data Definition
Language
B) Data Manipulation Language
C) Data Control Language
D) Data Structuring Language
36. "GROUP BY"
statement can be used with..... function.
A) COUNT
B) SUM
C) AVG
D) All of the above
37. Select the correct order
of keywords for SQL SELECT statements.
A) SELECT, WHERE, FROM
B) SELECT, FROM, WHERE
C) FROM, SELECT, WHERE
D) FROM, WHERE, SELECT
38. The objective of
normalization is to..... data duplication.
A) eliminate
B) reduce
C) increase
D) maximize
39. How do you present
slideshow from current slide?
A) F5
B) Shift+F5
C) Alt+F5
D) Ctrl+F5
40. A portion of a document
where one can set certain page formatting options as default is
A) Page Setup
B) Page
C) Paragraph
D) Section
41. Which of the following is
the file extension of the PowerPoint application?
A) .ppt
B).jpg
C).html
D) .docs
42. In spreadsheet, shortcut
key used to Open tab is.....
A) Ctrl+S
B) Ctrl+M
C) Ctrl+O
D) Ctrl+T
43. Which symbol is used for
absolute cell reference?
.A)$
B) %
C) #
D) &
44. Which feature of OOP is
exhibited by the function overriding?
.A) Polymorphism
B) Abstraction
C) Inheritance
D) None of the above
45. A pop() operation is
performed on an empty stack. What is the condition called?
A) Overflow
B) Underflow
C) Syntax error
D) Garbage collection
46. Which of the following is
the correct syntax for array initialization in C?
A) int a = {3,4,5)
B) int a[] = new int
(3,4,5)
C) int a[3] = [3,4,5)
D) int a(3) (3,4,5}
47. Which one of the following
is a loop construct that will always be executed once?
A) do while
B) for
C) while
D) switch
48. A web server delivers web
pages on the request of client using
A) FTP
B) SMTP
C) ICMP
D) HTTP
49. On which model is www
based upon?
A) Client-Server
B) Local Server
C) 3 tier
D) Peer to Peer
50. What are the basic
features of a CMS?
A) Content creation
B) Content Storage
C) Workflow management
D) All of above
superb
ReplyDelete